Provably secure authenticated group Diffie-Hellman key exchange
E Bresson, O Chevassut, D Pointcheval - ACM Transactions on …, 2007 - dl.acm.org
Authenticated key-exchange protocols allow two participants A and B, communicating over a
public network and each holding an authentication means to exchange a shared secret …
public network and each holding an authentication means to exchange a shared secret …
Strong accountability for network storage
AR Yumerefendi, JS Chase - ACM Transactions on Storage (TOS), 2007 - dl.acm.org
This article presents the design, implementation, and evaluation of CATS, a network storage
service with strong accountability properties. CATS offers a simple web services interface …
service with strong accountability properties. CATS offers a simple web services interface …
Used trusted co-servers to enhance security of web interaction
DM Chess, J Dyer, N Itoi, J Kravitz, ER Palmer… - US Patent …, 2007 - Google Patents
(22) Filed: Sep. 15, 2000 1,, and then said co-server carries out N functions: Fl.(i0... In)
describes What the co-server returns to party P,. The (51) Int-Cl- preferred embodiment of …
describes What the co-server returns to party P,. The (51) Int-Cl- preferred embodiment of …
Exploring software partitions for fast security processing on a multiprocessor mobile SoC
D Arora, A Raghunathan, S Ravi… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
The functionality of mobile devices, such as cell phones and personal digital assistants
(PDAs), has evolved to include various applications where security is a critical concern …
(PDAs), has evolved to include various applications where security is a critical concern …
Enhancing security in distributed systems with trusted computing hardware
JF Reid - 2007 - eprints.qut.edu.au
The need to increase the hostile attack resilience of distributed and internet-worked
computer systems is critical and pressing. This thesis contributes to concrete improvements …
computer systems is critical and pressing. This thesis contributes to concrete improvements …
[PDF][PDF] Provably-Secure Authenticated Group
DHK Exchange - Citeseer
Authenticated key exchange protocols allow two participants A and B, communicating over a
public network and each holding an authentication means, to exchange a shared secret …
public network and each holding an authentication means, to exchange a shared secret …
[图书][B] Security designs for uni-and multi-processors
L Gao - 2007 - search.proquest.com
With the prevalence of Internet, software executing on a broad range of systems are
constantly subject to malicious attacks in various forms. As a result, program execution may …
constantly subject to malicious attacks in various forms. As a result, program execution may …
[图书][B] Embedded system security: Hardware/software architectures and design methodologies
D Arora - 2007 - search.proquest.com
The large number of successful information security attacks in recent years, and the extent of
damage that they have caused, have led to the emergence of security as an important …
damage that they have caused, have led to the emergence of security as an important …