Sciweavers

2213 search results - page 342 / 443
» Software Security
Sort
View
CARDIS
1998
Springer
109views Hardware» more  CARDIS 1998»
15 years 7 months ago
The Vault, an Architecture for Smartcards to Gain Infinite Memory
Smartcard chips vendors have always done their best to embed more memory inside cards. These efforts are driven to allow their customers smartcard manufacturers - to mask more soft...
Patrick Biget
114
Voted
EUROCRYPT
1998
Springer
15 years 7 months ago
Auto-Recoverable Auto-Certifiable Cryptosystems
Abstract. This paper introduces a cryptographic paradigm called selfescrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosyst...
Adam Young, Moti Yung
107
Voted
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
15 years 7 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
133
Voted
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
15 years 7 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
125
Voted
ASAP
2004
IEEE
123views Hardware» more  ASAP 2004»
15 years 7 months ago
A Packet Scheduling Algorithm for IPSec Multi-Accelerator Based Systems
IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these al...
Fabien Castanier, Alberto Ferrante, Vincenzo Piuri