Sciweavers

5722 search results - page 100 / 1145
» Security Function Interactions
Sort
View
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
13 years 10 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
EH
2002
IEEE
108views Hardware» more  EH 2002»
14 years 1 months ago
We Need Assurance
When will we be secure? Nobody knows for sure – but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customersâ...
Brian D. Snow
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 9 months ago
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CCS
2008
ACM
13 years 10 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 9 months ago
Advanced Software Protection Now
We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalitie...
Diego Bendersky, Ariel Futoransky, Luciano Notarfr...