Sciweavers

364 search results - page 14 / 73
» E-Voting System Security Optimization
Sort
View
SP
1996
IEEE
14 years 18 days ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian
ISCI
2008
104views more  ISCI 2008»
13 years 8 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
DAGSTUHL
2007
13 years 10 months ago
Compiler-based Software Power Peak Elimination on Smart Card Systems
Abstract. RF-powered smart cards are widely used in different application areas today. For smart cards not only performance is an important attribute, but also the power consumed ...
Matthias Grumer, Manuel Wendt, Christian Steger, R...
IESA
2007
13 years 10 months ago
A Security Framework for Smart Ubiquitous Industrial Resources
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distribut...
Anton Naumenko, Artem Katasonov, Vagan Y. Terziyan
PE
2008
Springer
139views Optimization» more  PE 2008»
13 years 8 months ago
Performance optimization of region-based group key management in mobile ad hoc networks
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic r...
Jin-Hee Cho, Ing-Ray Chen, Ding-Chau Wang