Sciweavers

460 search results - page 44 / 92
» Heuristic Methods for Security Protocols
Sort
View
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
FC
2004
Springer
105views Cryptology» more  FC 2004»
14 years 1 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
ECAI
2004
Springer
14 years 1 months ago
Temporal Plan Interdependencies
Abstract. Asbru is a complex formal language developed to represent clinical guidelines and protocols which are time- and processoriented. To facilitate and support the modeling in...
Katharina Kaiser, Silvia Miksch
KBSE
2007
IEEE
14 years 2 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
CSREAPSC
2006
13 years 9 months ago
Distributed Pairwise Key Establishment in Wireless Sensor Networks
- Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric-key based ...
Yi Cheng, Dharma P. Agrawal