Predicting secret keys via branch prediction

O Acıiçmez, ÇK Koç, JP Seifert - Topics in Cryptology–CT-RSA 2007: The …, 2006 - Springer
This paper announces a new software side-channel attack—enabled by the branch
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …

[HTML][HTML] Distributed usage control

A Pretschner, M Hilty, D Basin - Communications of the ACM, 2006 - dl.acm.org
Distributed usage control Page 1 44 September 2006/Vol. 49, No. 9 COMMUNICATIONS OF
THE ACM Page 2 COMMUNICATIONS OF THE ACM September 2006/Vol. 49, No. 9 39 …

Software mitigations to hedge AES against cache-based software side channel vulnerabilities

E Brickell, G Graunke, M Neve, JP Seifert - Cryptology ePrint Archive, 2006 - eprint.iacr.org
Hardware side channel vulnerabilities have been studied for many years in embedded
silicon-security arena including SmartCards, SetTop-boxes, etc. However, because various …

Practical secrecy-preserving, verifiably correct and trustworthy auctions

DC Parkes, MO Rabin, SM Shieber… - Proceedings of the 8th …, 2006 - dl.acm.org
We present a practical system for conducting sealed-bid auctions that preserves the secrecy
of the bids while providing for verifiable correctness and trustworthiness of the auction. The …

Secure information sharing enabled by trusted computing and PEI models

R Sandhu, K Ranganathan, X Zhang - … of the 2006 ACM Symposium on …, 2006 - dl.acm.org
The central goal of secure information sharing is to" share but protect" where the motivation
to" protect" is to safeguard the sensitive content from unauthorized disclosure (in contrast to …

Usage control requirements in mobile and ubiquitous computing applications

M Hilty, A Pretschner, C Schaefer… - … Conference on Systems …, 2006 - ieeexplore.ieee.org
Usage control is concerned with control over data after its release to third parties, and
includes requirements such as" this data must be deleted after 30 days" and" this data may …

[PDF][PDF] Broadcast Encryption Using Probabilistic Key Distribution and Applications.

M Ramkumar - J. Comput., 2006 - 130.18.208.80
A family of novel broadcast encryption schemes based on probabilistic key pre-distribution
are proposed, that enable multiple sources to broadcast secrets, without the use of …

An efficient algorithm for resource sharing in peer-to-peer networks

WC Liao, F Papadopoulos, K Psounis - … , May 15-19, 2006. Proceedings 5, 2006 - Springer
The performance of peer-to-peer systems depends on the level of cooperation of the
system's participants. While most existing peer-to-peer architectures have assumed that …

[PDF][PDF] A peer-to-peer cooperation enhancement scheme and its performance analysis.

WC Liao, F Papadopoulos, K Psounis - J. Commun., 2006 - cut.ac.cy
The performance of peer-to-peer systems depends on the level of cooperation of the
system's participants. While most existing peer-to-peer architectures have assumed that …

验证方主导的远程证明方案

秦宇, 冯登国 - 计算机研究与发展, 2006 - cqvip.com
可信计算组织(TCG) 提出了以可信平台模块(TPM) 为核心的可信计算安全体系框架.
远程证明是可信计算领域重要的研究问题之一. 现有的远程证明方案都是由证明方发起 …