Sciweavers

631 search results - page 54 / 127
» Intrusion-Resilient Secure Channels
Sort
View
COMPSAC
2000
IEEE
15 years 8 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
POPL
2007
ACM
16 years 4 months ago
Assessing security threats of looping constructs
There is a clear intuitive connection between the notion of leakage of information in a program and concepts from information theory. This intuition has not been satisfactorily pi...
Pasquale Malacaria
ASYNC
2002
IEEE
123views Hardware» more  ASYNC 2002»
15 years 9 months ago
Improving Smart Card Security Using Self-Timed Circuits
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructing smart card functions that are resistant to side channel attacks and fault in...
Simon W. Moore, Robert D. Mullins, Paul A. Cunning...
IMA
2001
Springer
78views Cryptology» more  IMA 2001»
15 years 9 months ago
Unconditionally Secure Key Agreement Protocol
Abstract. The key agreement protocol are either based on some computational infeasability, such as the calculus of the discrete logarithm in [1], or on theoretical impossibility un...
Cyril Prissette
IJBC
2008
95views more  IJBC 2008»
15 years 4 months ago
Time Scaling of Chaotic Systems: Application to Secure Communications
The paper deals with time-scaling transformations of dynamical systems. Such scaling functions operate a change of coordinates on the time axis of the system trajectories preservi...
Donatello Materassi, Michele Basso