Sciweavers

2846 search results - page 519 / 570
» Not one click for security
Sort
View
154
Voted
JAPLL
2010
124views more  JAPLL 2010»
15 years 3 months ago
Reasoning about XML with temporal logics and automata
We show that problems arising in static analysis of XML specifications and transformations can be dealt with using techniques similar to those developed for static analysis of pr...
Leonid Libkin, Cristina Sirangelo
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
15 years 2 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
15 years 2 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
187
Voted
CASES
2010
ACM
15 years 2 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont
GI
2010
Springer
15 years 2 months ago
Finite System Composition and Interaction
: In this article, it is proven for finite systems that if by reciprocal interaction, one finite system determines the action of another finite system, then both systems become sub...
Johannes Reich