Sciweavers

24529 search results - page 142 / 4906
» Computing on Authenticated Data
Sort
View
128
Voted
CCS
2005
ACM
15 years 8 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
107
Voted
HIPC
2005
Springer
15 years 8 months ago
Data and Computation Abstractions for Dynamic and Irregular Computations
Sriram Krishnamoorthy, Jarek Nieplocha, P. Sadayap...
64
Voted
ICCS
2004
Springer
15 years 8 months ago
A Dynamic Data Driven Computational Infrastructure for Reliable Computer Simulations
J. Tinsley Oden, James C. Browne, Ivo Babuska, Cha...
117
Voted
CIDM
2007
IEEE
15 years 2 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
160
Voted
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 6 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...