Sciweavers

364 search results - page 19 / 73
» E-Voting System Security Optimization
Sort
View
PET
2009
Springer
14 years 3 months ago
On the Optimal Placement of Mix Zones
Abstract. In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identification. A frequently proposed solution to...
Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
14 years 3 months ago
SecBus: Operating System controlled hierarchical page-based memory bus protection
—This paper presents a new two-levels page-based memory bus protection scheme. A trusted Operating System drives a hardware cryptographic unit and manages security contexts for e...
Lifeng Su, Stephan Courcambeck, Pierre Guillemin, ...
SASN
2005
ACM
14 years 2 months ago
Coordinated sensor deployment for improving secure communications and sensing coverage
Sensor network has a great potential in applications such as habitat monitoring, wildlife tracking, building surveillance, and military combat. The design of a sensor network syst...
Yinian Mao, Min Wu
EDCC
2005
Springer
14 years 2 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
13 years 8 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...