Sciweavers

3451 search results - page 174 / 691
» Security of Backup Data
Sort
View
INTELLCOMM
2004
Springer
15 years 10 months ago
Secure Many-to-One Transmission of q-ary Symbols
There is a number of applications requiring a community of many senders to transmit some real-time information to a single receiver. Using unicast connections to send this traffic ...
Antoni Martínez-Ballesté, Francesc S...
140
Voted
ACISP
2010
Springer
15 years 6 months ago
Security Estimates for Quadratic Field Based Cryptosystems
Abstract. We describe implementations for solving the discrete logarithm problem in the class group of an imaginary quadratic field and in the infrastructure of a real quadratic fi...
Jean-François Biasse, Michael J. Jacobson, ...
134
Voted
ACSAC
2007
IEEE
15 years 11 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel
140
Voted
WICON
2008
15 years 6 months ago
Security challenges in seamless mobility: how to "handover" the keys?
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous acc...
Katrin Hoeper, Lidong Chen, Antonio Izquierdo, Nad...
CORR
2008
Springer
91views Education» more  CORR 2008»
15 years 4 months ago
Secure Lossless Compression with Side Information
Secure data compression in the presence of side information at both a legitimate receiver and an eavesdropper is explored. A noise-free, limited rate link between the source and th...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...