Sciweavers

6555 search results - page 75 / 1311
» Secure attribute-based systems
Sort
View
ETFA
2005
IEEE
14 years 2 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
CAU
2004
192views Cryptology» more  CAU 2004»
13 years 10 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
EVOTING
2004
113views Hardware» more  EVOTING 2004»
13 years 10 months ago
E-Voting and Biometric Systems
: As e-Voting gains more importance while practicable solutions are being implemented, more questions arise concerning alternative possibilities for a secure and feasible authentic...
Sonja Hof
CSFW
2008
IEEE
14 years 3 months ago
A Type System for Observational Determinism
Zdancewic and Myers introduced observational determinism as a scheduler independent notion of security for concurrent programs. This paper proposes a type system for verifying obs...
Tachio Terauchi
ISCAS
2005
IEEE
129views Hardware» more  ISCAS 2005»
14 years 2 months ago
Cryptanalysis of a multistage encryption system
— This paper analyzes the security of a new multistage encryption system (MES) recently proposed in ISCAS’2004. It is found that MES is insecure against a differential chosenpl...
Chengqing Li, Xinxiao Li, Shujun Li, Guanrong Chen