Sciweavers

6164 search results - page 1075 / 1233
» Teaching Computer Security
Sort
View
126
Voted
APNOMS
2008
Springer
15 years 5 months ago
Towards Management Requirements of Future Internet
The Internet is one of the most successful modern technologies; we cannot imagine what our lives would be without the Internet. Despite the huge success of the Internet, many probl...
Sung-Su Kim, Mi-Jung Choi, Hong-Taek Ju, Masayoshi...
125
Voted
ATC
2008
Springer
15 years 5 months ago
Concepts for Autonomous Control Flow Checking for Embedded CPUs
In this paper, we introduce new concepts and methods for checking the correctness of control flow instructions during the execution of programs in embedded CPUs. Detecting and avoi...
Daniel Ziener, Jürgen Teich
156
Voted
AUTONOMICS
2008
ACM
15 years 5 months ago
Emergent engineering for the management of complex situations
Ubiquitous computing and communication environments connect systems and people in unprecedented ways, but also fundamentally challenge the mindset of traditional systems engineeri...
René Doursat, Mihaela Ulieru
129
Voted
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
15 years 5 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
114
Voted
ICCSA
2010
Springer
15 years 5 months ago
An Identifiable Yet Unlinkable Authentication System with Smart Cards for Multiple Services
The purpose of this paper is to realize an authentication system which satisfies four requirements for security, privacy protection, and usability, that is, impersonation resistanc...
Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Ke...
« Prev « First page 1075 / 1233 Last » Next »