Sciweavers

86 search results - page 6 / 18
» Security problems with improper implementations of improved ...
Sort
View
VTC
2007
IEEE
101views Communications» more  VTC 2007»
15 years 3 months ago
Secure Position-Based Routing for VANETs
— Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So fa...
Charles Harsch, Andreas Festag, Panos Papadimitrat...
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
15 years 3 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
79
Voted
CHES
2006
Springer
152views Cryptology» more  CHES 2006»
15 years 1 months ago
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style
In recent years, some countermeasures against Differential Power Analysis (DPA) at the logic level have been proposed. At CHES 2005 conference, Popp and Mangard proposed a new coun...
Daisuke Suzuki, Minoru Saeki
IEEESCC
2008
IEEE
15 years 3 months ago
A Secure Information Flow Architecture for Web Services
Current web service platforms (WSPs) often perform all web services-related processing, including securitysensitive information handling, in the same protection domain. Consequent...
Lenin Singaravelu, Jinpeng Wei, Calton Pu
WWW
2005
ACM
15 years 10 months ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin