Sciweavers

319 search results - page 55 / 64
» Controlled Secret Leakage
Sort
View
IEEEARES
2010
IEEE
14 years 1 months ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...
ESORICS
2002
Springer
14 years 7 months ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski
CCS
2007
ACM
14 years 2 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
MDM
2007
Springer
14 years 2 months ago
Privacy (Regimes) Do Not Threaten Location Technology Development
Location technology allows for the tracking and tracing of individuals. Users may increasingly be concerned about the abilities of new technology to keep an eye on ones’ private...
Bastiaan van Loenen, Jaap Zevenbergen
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
14 years 2 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase