Sciweavers

216 search results - page 13 / 44
» Security Measures and Weaknesses of the GPRS Security Archit...
Sort
View
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
14 years 1 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
WICSA
2007
13 years 9 months ago
Assessing a Multi-Site Development Organization for Architectural Compliance
Multi-site development organizations require coordination and communication efforts between different sites to ensure successful distributed development. These efforts need to be ...
Viktor Clerc, Patricia Lago, Hans van Vliet
ITNG
2007
IEEE
14 years 2 months ago
Securing MPLS Networks with Multi-path Routing
— MPLS security is an evolving issue which has been raised by many researchers and service providers. The basic architecture of MPLS network does not provide security services su...
Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
11 years 11 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
CN
2004
106views more  CN 2004»
13 years 8 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...