Sciweavers

3486 search results - page 49 / 698
» On the Design and Security of RC2
Sort
View
ACSAC
2004
IEEE
14 years 14 days ago
Towards Secure Design Choices for Implementing Graphical Passwords
We study the impact of selected parameters on the size of the password space for "Draw-A-Secret" (DAS) graphical passwords. We examine the role of and relationships betw...
Julie Thorpe, Paul C. van Oorschot
ASIACRYPT
2008
Springer
13 years 10 months ago
Graph Design for Secure Multiparty Computation over Non-Abelian Groups
Recently, Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. They considered the passive adversary model and they assumed that the...
Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tart...
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
14 years 14 days ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
DAC
2003
ACM
14 years 9 months ago
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
IAT
2007
IEEE
14 years 3 months ago
Towards Automated Design of Multi-party Rational Exchange Security Protocols
It is only recently that rational exchange schemes have been considered as an alternative solution to the exchange problem. A rational exchange protocol cannot provide fairness bu...
Almudena Alcaide, Juan M. Estévez-Tapiador,...