Sciweavers

262 search results - page 33 / 53
» MONA Implementation Secrets
Sort
View
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 8 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ESORICS
2002
Springer
14 years 8 months ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski
PERCOM
2006
ACM
14 years 8 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste
ICC
2009
IEEE
162views Communications» more  ICC 2009»
14 years 3 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
ICTAI
2009
IEEE
14 years 3 months ago
Emergence of Memory-like Behavior in Reactive Agents Using External Markers
Early primitive animals with simple feed-forward neuronal circuits were limited to reactive behavior. Through evolution, they were gradually equipped with memory and became able t...
Ji Ryang Chung, Yoonsuck Choe