Sciweavers

1656 search results - page 194 / 332
» Secure Computation Without Authentication
Sort
View
CASES
2003
ACM
14 years 3 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
ACSAC
2003
IEEE
14 years 3 months ago
Practical Random Number Generation in Software
There is a large gap between the theory and practice for random number generation. For example, on most operating systems, using /dev/random to generate a 256-bit AES key is highl...
John Viega
SOFSEM
1998
Springer
14 years 2 months ago
Security of Electronic Money
Abstract. The realisation of electronic commerce process is very difficult without appropriate system for electronic payment. Of course it is possible to use some of the convention...
Petr Hanácek
COLCOM
2008
IEEE
14 years 1 days ago
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers i...
Tuan Phan, Danfeng (Daphne) Yao
JCP
2008
216views more  JCP 2008»
13 years 10 months ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng