Sciweavers

2846 search results - page 72 / 570
» Not one click for security
Sort
View
133
Voted
IMA
2005
Springer
71views Cryptology» more  IMA 2005»
15 years 9 months ago
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Abstract. The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi et al. and Vazirani and Vazirani, who proved independently that O(log...
Andrey Sidorenko, Berry Schoenmakers
ACSAC
2000
IEEE
15 years 8 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
123
Voted
ASPLOS
2008
ACM
15 years 6 months ago
Parallelizing security checks on commodity hardware
Speck1 is a system that accelerates powerful security checks on commodity hardware by executing them in parallel on multiple cores. Speck provides an infrastructure that allows se...
Edmund B. Nightingale, Daniel Peek, Peter M. Chen,...
DAGSTUHL
2006
15 years 5 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens
WOA
2000
15 years 5 months ago
How a Secure and Open Mobile Agent Framework Suits Electronic Commerce Applications
The Mobile Agent (MA) paradigm seems able to support effectively distributed applications in open and heterogeneous environments, and application areas such as ecommerce appear to...
Paolo Bellavista, Antonio Corradi, Rebecca Montana...