Sciweavers

1120 search results - page 14 / 224
» Securely sharing neuroimagery
Sort
View
DAC
2008
ACM
13 years 11 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
CCS
2010
ACM
13 years 7 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 10 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
IADIS
2004
13 years 11 months ago
Hacker Activity on the Irish Honeynet
The Irish HoneyNet Project is an all volunteer, non-profit organisation committed to sharing and learning the motives, tools, and tactics of the blackhat community comprised of a ...
Kevin Curran, Colman Morrissey, Colm Fagan, Colm M...
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
14 years 4 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri