Sciweavers

3482 search results - page 134 / 697
» Designing for security
Sort
View
NBIS
2009
Springer
14 years 3 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
ACSAC
2002
IEEE
14 years 2 months ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen
ACNS
2010
Springer
134views Cryptology» more  ACNS 2010»
13 years 10 months ago
Efficient and Secure Evaluation of Multivariate Polynomials and Applications
In this work, we design two-party and multiparty protocols for evaluating multivariate polynomials at participants' inputs with security against a malicious adversary who may ...
Matthew K. Franklin, Payman Mohassel
SISW
2005
IEEE
14 years 2 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
CODES
2003
IEEE
14 years 2 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang