Sciweavers

5484 search results - page 158 / 1097
» Almost-Everywhere Secure Computation
Sort
View
IJISEC
2007
149views more  IJISEC 2007»
15 years 4 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
15 years 1 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
CCS
2009
ACM
15 years 9 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
CVPR
2007
IEEE
16 years 6 months ago
Revocable Fingerprint Biotokens: Accuracy and Security Analysis
Terrance E. Boult, Walter J. Scheirer, Robert Wood...