Sciweavers

897 search results - page 17 / 180
» Security Requirements for RFID Computing Systems
Sort
View
DCC
2008
IEEE
14 years 7 months ago
Semantic security for the McEliece cryptosystem without random oracles
In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and ...
Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill M...
EUROMICRO
1999
IEEE
14 years 9 days ago
JFS: A Secure Distributed File System for Network Computers
Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the co...
Marcus O'Connell, Paddy Nixon
CSE
2009
IEEE
14 years 2 months ago
Privacy Requirements in Vehicular Communication Systems
Abstract—A primary goal of vehicular communication systems is the enhancement of traffic safety by equipping vehicles with wireless communication units to facilitate cooperative...
Florian Schaub, Zhendong Ma, Frank Kargl
COMPSEC
2006
143views more  COMPSEC 2006»
13 years 8 months ago
A novel approach for computer security education using Minix instructional operating system
To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. In th...
Wenliang Du, Mingdong Shang, Haizhi Xu
GI
2009
Springer
13 years 12 months ago
Classifying Privacy and Verifiability Requirements for Electronic Voting
Abstract: Voter privacy and verifiability are fundamental security concepts for electronic voting. Existing literature on electronic voting provides many definitions and interpreta...
Lucie Langer, Axel Schmidt, Melanie Volkamer, Joha...