For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Many applications in eLearning utilize wireless networks (WLAN) as a carrier for data and communication. These networks in their basic form are insecure, protecting the communicat...
Abstract. Secure multi-party computation has been considered by the cryptographic community for a number of years. Until recently it has been a purely theoretical area, with few im...
Benny Pinkas, Thomas Schneider, Nigel P. Smart, St...
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the securi...
Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhon...