Sciweavers

516 search results - page 40 / 104
» Comparing Two Information Flow Security Properties
Sort
View
TIFS
2008
133views more  TIFS 2008»
13 years 8 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas
SEMWEB
2005
Springer
14 years 2 months ago
A Strategy for Automated Meaning Negotiation in Distributed Information Retrieval
The paper reports on the formal framework to design strategies for multi-issue non-symmetric meaning negotiations among software agents in a distributed information retrieval syste...
Vadim Ermolayev, Natalya Keberle, Wolf-Ekkehard Ma...
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 2 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
CCS
2007
ACM
14 years 3 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
14 years 1 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront