Sciweavers

949 search results - page 80 / 190
» Design methods for security and trust
Sort
View
MSWIM
2005
ACM
14 years 2 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
FC
2009
Springer
134views Cryptology» more  FC 2009»
14 years 3 months ago
Cryptographic Combinatorial Securities Exchanges
Abstract. We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information ...
Christopher Thorpe, David C. Parkes
CHES
2005
Springer
96views Cryptology» more  CHES 2005»
14 years 2 months ago
The "Backend Duplication" Method
Abstract. Several types of logic gates suitable for leakage-proof computations have been put forward [1,2,3,4]. This paper describes a method, called “backend duplication” to a...
Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu,...
CCR
2006
76views more  CCR 2006»
13 years 9 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
COMPSAC
2009
IEEE
14 years 4 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz