Sciweavers

5484 search results - page 155 / 1097
» Almost-Everywhere Secure Computation
Sort
View
INFOSECCD
2006
ACM
15 years 10 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling
NSPW
2004
ACM
15 years 9 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten
116
Voted
PET
2004
Springer
15 years 9 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li
106
Voted
ANCS
2007
ACM
15 years 8 months ago
Design of a network architecture with inherent data path security
Next-generation Internet architectures require designs with inherent security guarantees. We present a network architecture that uses credentials to audit traffic in the data path...
Tilman Wolf
CHI
2007
ACM
16 years 4 months ago
Designing software for consumers to easily set up a secure home network
Brenton Elmore, Stuart Hamilton, Subbarao Ivaturi