Sciweavers

1737 search results - page 146 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 10 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
122
Voted
CHES
2000
Springer
121views Cryptology» more  CHES 2000»
15 years 8 months ago
On Boolean and Arithmetic Masking against Differential Power Analysis
Abstract. Since the announcement of the Differential Power Analysis (DPA) by Paul Kocher and al., several countermeasures were proposed in order to protect software implementations...
Jean-Sébastien Coron, Louis Goubin
SOUPS
2010
ACM
15 years 8 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
MWCN
2004
Springer
15 years 10 months ago
Supporting Groupware in Mobile Networks
Abstract We present MaGMA (Mobility and Group Management Architecture), an architecture for groupware support in mobile networks. MaGMA’s main objective is enabling mobile users ...
Nadav Lavi, Israel Cidon, Idit Keidar
PODS
2005
ACM
136views Database» more  PODS 2005»
16 years 5 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...