Sciweavers

55 search results - page 6 / 11
» Computer security impaired by legitimate users
Sort
View
MOBIHOC
2012
ACM
11 years 9 months ago
Enforcing dynamic spectrum access with spectrum permits
Dynamic spectrum access is a maturing technology that allows next generation wireless devices to make highly efficient use of wireless spectrum. Spectrum can be allocated on an o...
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher ...
MEDIAFORENSICS
2010
13 years 5 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
PERCOM
2004
ACM
14 years 7 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
14 years 28 days ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
ACSAC
2002
IEEE
14 years 10 days ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer