Sciweavers

4305 search results - page 252 / 861
» Analysing Protocol Implementations
Sort
View
EUROCRYPT
2008
Springer
13 years 11 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
ESORICS
2009
Springer
14 years 10 months ago
A Generic Security API for Symmetric Key Management on Cryptographic Devices
Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing APIs are not always clear. In this paper, we give a new generi...
Véronique Cortier, Graham Steel
PERCOM
2006
ACM
14 years 9 months ago
Using buddies to live longer in a boring world
In a sensor network monitoring natural environment, the readings of sensor nodes show high temporal and spatial correlation. This stems from the fact that most characteristics of ...
Samir Goel, Tomasz Imielinski, Andrea Passarella
ICC
2008
IEEE
139views Communications» more  ICC 2008»
14 years 4 months ago
Enabling Flexible Packet Filtering Through Dynamic Code Generation
— Despite its efficiency, the general approach of hardcoding protocol format descriptions in packet processing applications suffers from many limitations. Among the others, the l...
Olivier Morandi, Fulvio Risso, Mario Baldi, Andrea...
INFOCOM
2008
IEEE
14 years 4 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora