Sciweavers

3821 search results - page 149 / 765
» A Security Model for Aglets
Sort
View
IACR
2011
101views more  IACR 2011»
12 years 8 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
14 years 2 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...
ASIACRYPT
2000
Springer
14 years 1 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
ASPDAC
2005
ACM
89views Hardware» more  ASPDAC 2005»
13 years 11 months ago
System-level design space exploration for security processor prototyping in analytical approaches
— The customization of architectures in designing the security processor-based systems typically involves timeconsuming simulation and sophisticated analysis in the exploration o...
Yung-Chia Lin, Chung-Wen Huang, Jenq Kuen Lee
WSC
2004
13 years 10 months ago
Simulation of an Airport Passenger Security System
As part of the new security environment at the nation's airports, discrete event simulation modeling was applied shortly after 9-11 to understand the operational dynamics of ...
David R. Pendergraft, Craig V. Robertson, Shelly S...