Sciweavers

5722 search results - page 110 / 1145
» Security Function Interactions
Sort
View
ENTCS
2007
113views more  ENTCS 2007»
13 years 8 months ago
The Interactive Curry Observation Debugger iCODE
Debugging by observing the evaluation of expressions and functions is a useful approach for finding bugs in lazy functional and functional logic programs. However, adding and rem...
Parissa H. Sadeghi, Frank Huch
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
14 years 2 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
EUROCRYPT
2010
Springer
14 years 1 months ago
Bounded Key-Dependent Message Security
We construct the first public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...
SAC
2011
ACM
12 years 11 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
EUROITV
2008
Springer
13 years 10 months ago
An Experimental Platform Based on MCE for Interactive TV
In this paper, we propose an experimental platform for the design of interactive TV. On this platform, designers are allowed to emulate broadcasting programs, define control functi...
Ping-Yi Liu, Hung-Wei Lee, Tsai-Yen Li, Shwu-Lih H...