Sciweavers

391 search results - page 72 / 79
» On-Line Secret Sharing
Sort
View
JUCS
2008
147views more  JUCS 2008»
13 years 7 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
ACSAC
2010
IEEE
13 years 5 months ago
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, trad...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang
ASIACRYPT
2010
Springer
13 years 5 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
ICDE
2009
IEEE
255views Database» more  ICDE 2009»
14 years 9 months ago
Database Management as a Service: Challenges and Opportunities
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data man...
Ahmed Metwally, Amr El Abbadi, Divyakant Agrawal, ...
HICSS
2010
IEEE
225views Biometrics» more  HICSS 2010»
14 years 2 months ago
A Comparative Analysis of Professional Forums in the United States Army and Hybrid Communities of Practice in the Civilian Secto
Communities of practice (COPs) have been around since the founding of the first social networks many millennia ago. Organizations around the world over the last two decades have l...
Jon Brickey, Steven Walczak