Sciweavers

1317 search results - page 48 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
IEEESP
2010
126views more  IEEESP 2010»
15 years 2 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
WISTP
2010
Springer
15 years 11 months ago
Towards Electrical, Integrated Implementations of SIMPL Systems
ct This paper discusses the practical implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems can be regarded as a public key versio...
Ulrich Rührmair, Qingqing Chen, Martin Stutzm...
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
15 years 11 months ago
Understanding Knowledge-Intensive, Practice-Oriented Business Processes
In order to create new opportunities for competitive differentiation, organisations are starting to shift their focus from transactional operational Business Processes (BPs) to ot...
Olivera Marjanovic, Ravi Seethamraju
ACSAC
2003
IEEE
15 years 9 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella
NDSS
2005
IEEE
15 years 10 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...