Sciweavers

577 search results - page 28 / 116
» Engineering Sufficiently Secure Computing
Sort
View
CRYPTO
2008
Springer
120views Cryptology» more  CRYPTO 2008»
15 years 4 months ago
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed...
Jean-Sébastien Coron, Jacques Patarin, Yann...
128
Voted
AMW
2010
15 years 4 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
AOSD
2009
ACM
15 years 9 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
AINA
2003
IEEE
15 years 7 months ago
Design, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a netwo...
Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung
123
Voted
EUROSYS
2010
ACM
15 years 11 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverā€...
Vitaly Chipounov, George Candea