Sciweavers

262 search results - page 34 / 53
» MONA Implementation Secrets
Sort
View
ISW
2009
Springer
14 years 3 months ago
Towards Security Notions for White-Box Cryptography
Abstract. While code obfuscation attempts to hide certain characteristics of a program independently of an application, white-box cryptography (WBC) specifically focuses on softwa...
Amitabh Saxena, Brecht Wyseur, Bart Preneel
SIGGRAPH
2009
ACM
14 years 3 months ago
scoreLight
”scoreLight” is a playful musical instrument capable of generating sound from the lines of doodles as well as edges of threedimensional objects nearby (hands, dancer’s silho...
Álvaro Cassinelli, Yusaku Kuribara, Masatos...
ACSAC
2008
IEEE
14 years 3 months ago
OMOS: A Framework for Secure Communication in Mashup Applications
Mashups are new Web 2.0 applications that seamlessly combine contents from multiple heterogeneous data sources into one integrated browser environment. The hallmark of these appli...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
14 years 3 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speci...
Anooshiravan Saboori, Christoforos N. Hadjicostis
SASO
2008
IEEE
14 years 3 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...