Sciweavers

5843 search results - page 182 / 1169
» Software Security in Practice
Sort
View
115
Voted
FC
2009
Springer
95views Cryptology» more  FC 2009»
15 years 11 months ago
Secure Multiparty Computation Goes Live
In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptogr...
Peter Bogetoft, Dan Lund Christensen, Ivan Damg&ar...
143
Voted
EUROCRYPT
2001
Springer
15 years 9 months ago
How Secure Are Elliptic Curves over Composite Extension Fields?
We compare the method of Weil descent for solving the ECDLP, over extensions fields of composite degree in characteristic two, against the standard method of parallelised Pollard ...
Nigel P. Smart
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 8 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
QUATIC
2007
IEEE
15 years 11 months ago
Modeling the Experimental Software Engineering Process
– Systematic reviews on software engineering literature have shown an insufficient experimental validation of claims, when compared to the standard practice in other wellestablis...
Miguel Goulão, Fernando Brito e Abreu
CCS
2007
ACM
15 years 10 months ago
An independent audit framework for software dependent voting systems
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
Sujata Garera, Aviel D. Rubin