Provably secure authenticated group Diffie-Hellman key exchange

E Bresson, O Chevassut, D Pointcheval - ACM Transactions on …, 2007 - dl.acm.org
Authenticated key-exchange protocols allow two participants A and B, communicating over a
public network and each holding an authentication means to exchange a shared secret …

Strong accountability for network storage

AR Yumerefendi, JS Chase - ACM Transactions on Storage (TOS), 2007 - dl.acm.org
This article presents the design, implementation, and evaluation of CATS, a network storage
service with strong accountability properties. CATS offers a simple web services interface …

Used trusted co-servers to enhance security of web interaction

DM Chess, J Dyer, N Itoi, J Kravitz, ER Palmer… - US Patent …, 2007 - Google Patents
(22) Filed: Sep. 15, 2000 1,, and then said co-server carries out N functions: Fl.(i0... In)
describes What the co-server returns to party P,. The (51) Int-Cl- preferred embodiment of …

Exploring software partitions for fast security processing on a multiprocessor mobile SoC

D Arora, A Raghunathan, S Ravi… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
The functionality of mobile devices, such as cell phones and personal digital assistants
(PDAs), has evolved to include various applications where security is a critical concern …

Enhancing security in distributed systems with trusted computing hardware

JF Reid - 2007 - eprints.qut.edu.au
The need to increase the hostile attack resilience of distributed and internet-worked
computer systems is critical and pressing. This thesis contributes to concrete improvements …

[PDF][PDF] Provably-Secure Authenticated Group

DHK Exchange - Citeseer
Authenticated key exchange protocols allow two participants A and B, communicating over a
public network and each holding an authentication means, to exchange a shared secret …

[图书][B] Security designs for uni-and multi-processors

L Gao - 2007 - search.proquest.com
With the prevalence of Internet, software executing on a broad range of systems are
constantly subject to malicious attacks in various forms. As a result, program execution may …

[图书][B] Embedded system security: Hardware/software architectures and design methodologies

D Arora - 2007 - search.proquest.com
The large number of successful information security attacks in recent years, and the extent of
damage that they have caused, have led to the emergence of security as an important …

[引用][C] Un vistazo a las técnicas de protección de software basadas en hardware

HD Pando, YN Musa, RS Lima