Sciweavers

217 search results - page 29 / 44
» A Knowledge Base for Justified Information Security Decision...
Sort
View
EUROPKI
2004
Springer
14 years 1 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
ADHOC
2007
144views more  ADHOC 2007»
13 years 7 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
CAISE
2007
Springer
14 years 1 months ago
Achieving trust in IT outsourcing relationships
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Eva Söderström, Christian Lennerholt
SPEECH
2011
13 years 2 months ago
Combining localization cues and source model constraints for binaural source separation
We describe a system for separating multiple sources from a two-channel recording based on interaural cues and prior knowledge of the statistics of the underlying source signals. ...
Ron J. Weiss, Michael I. Mandel, Daniel P. W. Elli...
NDSS
2007
IEEE
14 years 2 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith