Sciweavers

623 search results - page 57 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
127
Voted
CSE
2009
IEEE
15 years 7 months ago
Adapting Privacy-Preserving Computation to the Service Provider Model
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
Florian Kerschbaum
132
Voted
SP
2002
IEEE
117views Security Privacy» more  SP 2002»
15 years 3 months ago
Grids: The top ten questions
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Jennifer M. Schopf, Bill Nitzberg
120
Voted
ESORICS
2007
Springer
15 years 9 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
139
Voted
ATAL
2011
Springer
14 years 3 months ago
GUARDS: game theoretic security allocation on a national scale
Building on research previously reported at AAMAS conferences, this paper describes an innovative application of a novel gametheoretic approach for a national scale security deplo...
James Pita, Milind Tambe, Christopher Kiekintveld,...
146
Voted
CCS
2010
ACM
15 years 3 months ago
Security analysis of India's electronic voting machines
Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, kn...
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Ha...