Sciweavers

6164 search results - page 916 / 1233
» Teaching Computer Security
Sort
View
POPL
2004
ACM
16 years 5 months ago
A bisimulation for dynamic sealing
We define seal, an untyped call-by-value -calculus with primitives for protecting abstract data by sealing, and develop a bisimulation proof method that is sound and complete with...
Eijiro Sumii, Benjamin C. Pierce
PERCOM
2007
ACM
16 years 4 months ago
Identity-Based Encryption for Sensor Networks
In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the...
Leonardo B. Oliveira, Ricardo Dahab, Julio L&oacut...
PERCOM
2005
ACM
16 years 4 months ago
Gaia Microserver: An Extendable Mobile Middleware Platform
The Gaia ubiquitous computing platform currently supports mobile devices through a thin client proxy architecture. Mobile devices run a lightweight proxy client written in J2ME to...
Ellick Chan, Jim Bresler, Jalal Al-Muhtadi, Roy H....
DCC
2001
IEEE
16 years 4 months ago
Bounds for the Multicovering Radii of Reed-Muller Codes with Applications to Stream Ciphers
The multicovering radii of a code are recent generalizations of the covering radius of a code. For positive m, the m-covering radius of C is the least radius t such that every m-tu...
Iiro S. Honkala, Andrew Klapper
ICDCS
2009
IEEE
16 years 1 months ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg