Sciweavers

3482 search results - page 75 / 697
» Designing for security
Sort
View
PROVSEC
2009
Springer
14 years 3 months ago
Chosen-Ciphertext Secure RSA-Type Cryptosystems
This paper explains how to design fully secure RSA-type cryptosystems from schemes only secure against passive attacks, in the standard model. We rely on instance-independence assu...
Benoît Chevallier-Mames, Marc Joye
NTMS
2008
IEEE
14 years 3 months ago
MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric Approaches
Wireless Sensor Networks (WSNs) are a new technology that is expected to be used increasingly in the near future due to its cheap cost and data processing ability. However, securi...
Hani Alzaid, Manal Alfaraj
IJNSEC
2010
66views more  IJNSEC 2010»
13 years 3 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald
EURODAC
1994
IEEE
148views VHDL» more  EURODAC 1994»
14 years 1 months ago
Design automation of self checking circuits
In this paper we explain the steps of the CAD tools developed for self checking circuits. The CAD tools developed are used to design Strongly Fault Secure, Strongly Code Disjoint ...
Sayed Mohammad Kia, Sri Parameswaran
INFOCOM
2008
IEEE
14 years 3 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan