Sciweavers

741 search results - page 42 / 149
» Abstract Machines for Communication Security
Sort
View
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
14 years 1 months ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg
ESORICS
2006
Springer
14 years 1 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
ACSAC
2004
IEEE
14 years 1 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
AMAST
2004
Springer
14 years 3 months ago
Counting Votes with Formal Methods
This abstract provides some background information about the electronic voting experiment that is planned in the Netherlands for the European Elections of 2004, and about our own i...
Bart Jacobs
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
14 years 3 months ago
An Experimental Study on Energy Consumption of Video Encryption for Mobile Handheld Devices
Abstract Secure video communication on mobile handheld devices is challenging mainly due to (a) the significant computational needs of both video coding and encryption algorithms ...
Kyoungwoo Lee, Nikil Dutt, Nalini Venkatasubramani...