Sciweavers

1005 search results - page 69 / 201
» Practical Secure Function Evaluation
Sort
View
IACR
2011
111views more  IACR 2011»
12 years 8 months ago
Secure Multi-Party Sorting and Applications
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing...
Kristján Valur Jónsson, Gunnar Kreit...
ASPDAC
2005
ACM
81views Hardware» more  ASPDAC 2005»
13 years 11 months ago
Power estimation starategies for a low-power security processor
In this paper, we present the power estimation methodologies for the development of a low-power security processor that contains significant amount of logic and memory. For the lo...
Yen-Fong Lee, Shi-Yu Huang, Sheng-Yu Hsu, I-Ling C...
ASE
2008
120views more  ASE 2008»
13 years 9 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone
ICIP
2006
IEEE
14 years 10 months ago
Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration
In this paper, we present a framework for the design of steganographic schemes that can provide provable security by achieving zero Kullback-Leibler divergence between the cover a...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
ESORICS
2006
Springer
14 years 17 days ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...