Sciweavers

5484 search results - page 148 / 1097
» Almost-Everywhere Secure Computation
Sort
View
ECOOPW
2006
Springer
15 years 7 months ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo
SAC
2008
ACM
15 years 3 months ago
Web service security management using semantic web techniques
The importance of the Web service technology for business, government, among other sectors, is growing. Its use in these sectors demands security concern. The Web Services Securit...
Diego Zuquim Guimarães Garcia, Maria Beatri...
PERCOM
2010
ACM
15 years 2 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...
IACR
2011
120views more  IACR 2011»
14 years 3 months ago
McOE: A Foolproof On-Line Authenticated Encryption Scheme
On-Line Authenticated Encryption (OAE) combines confidentiality with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be ...
Ewan Fleischmann, Christian Forler, Stefan Lucks
TRUST
2009
Springer
15 years 10 months ago
Measuring Semantic Integrity for Remote Attestation
Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, ...