Sciweavers

5484 search results - page 92 / 1097
» Almost-Everywhere Secure Computation
Sort
View
163
Voted
ASIACRYPT
2011
Springer
14 years 3 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer
NSPW
2003
ACM
15 years 9 months ago
Bringing security home: a process for developing secure and usable systems
The aim of this paper is to provide better support for the development of secure systems. We argue that current development practice suffers from two key problems:
Ivan Flechais, Martina Angela Sasse, Stephen Haile...
ICSOC
2009
Springer
15 years 1 months ago
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to ...
Weishan Zhang, Julian Schütte, Mads Ingstrup,...
COMPUTER
2004
61views more  COMPUTER 2004»
15 years 3 months ago
Routing and Security in Mobile Ad Hoc Networks
Nikola Milanovic, Miroslaw Malek, Anthony Davidson...
COMPUTER
1998
69views more  COMPUTER 1998»
15 years 3 months ago
Integrating Security into the Curriculum
Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frinc...