Sciweavers

2429 search results - page 135 / 486
» Using Aspects to Design a Secure System
Sort
View
ECWEB
2007
Springer
155views ECommerce» more  ECWEB 2007»
14 years 1 months ago
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (fo...
Jesús Téllez Isaac, José Sier...
RECONFIG
2008
IEEE
268views VLSI» more  RECONFIG 2008»
14 years 3 months ago
Parametric, Secure and Compact Implementation of RSA on FPGA
1 We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circuit especially intended for FPGAs on the low end of the price range. The desig...
Ersin Oksuzoglu, Erkay Savas
PLDI
2011
ACM
13 years 1 days ago
Caisson: a hardware description language for secure information flow
Information flow is an important security property that must be incorporated from the ground up, including at hardware design time, to provide a formal basis for a system’s roo...
Xun Li 0001, Mohit Tiwari, Jason Oberg, Vineeth Ka...
CCS
1994
ACM
14 years 1 months ago
Protocol Failure in the Escrowed Encryption Standard
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Matt Blaze
POPL
2005
ACM
14 years 9 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic