Sciweavers

894 search results - page 57 / 179
» Secure Implementation of Channel Abstractions
Sort
View
JIRS
2010
120views more  JIRS 2010»
13 years 8 months ago
Simple and Robust Attainment of Transparency Based on Two-Channel Control Architectures Using Time-Delay Control
Abstract This paper investigates simple and robust transparency-attainable control architectures for bilateral teleoperation. The strength of two-channel control architectures and ...
Jonghyun Kim, Hyung-Soon Park, Pyung Hun Chang
COLCOM
2007
IEEE
14 years 4 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 8 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
CSFW
2009
IEEE
14 years 4 months ago
Universally Composable Symmetric Encryption
For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities...
Ralf Küsters, Max Tuengerthal
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
14 years 1 months ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao