Sciweavers

2403 search results - page 83 / 481
» Cyberinsurance in IT Security Management
Sort
View
CIKM
2006
Springer
14 years 2 months ago
Secure search in enterprise webs: tradeoffs in efficient implementation for document level security
Document level security (DLS)
Peter Bailey, David Hawking, Brett Matson
ADVIS
2004
Springer
14 years 3 months ago
Practical and Secure E-Mail System (PractiSES)
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a networ...
Albert Levi, Mahmut Özcan
INDOCRYPT
2003
Springer
14 years 3 months ago
Security Analysis of Several Group Signature Schemes
At Eurocrypt’91, Chaum and van Heyst introduced the concept of group signature. In such a scheme, each group member is allowed to sign messages on behalf of a group anonymously. ...
Guilin Wang
DISCEX
2003
IEEE
14 years 3 months ago
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer
This paper proposes several integrated security architecture designs for client-server group communication systems. In an integrated architecture, security services are implemente...
Yair Amir, Cristina Nita-Rotaru, Jonathan Robert S...
CSE
2009
IEEE
14 years 5 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...