Sciweavers

3482 search results - page 197 / 697
» Designing for security
Sort
View
GRID
2006
Springer
13 years 9 months ago
Flexible and Secure Logging of Grid Data Access
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
IMA
2005
Springer
85views Cryptology» more  IMA 2005»
14 years 2 months ago
The Physically Observable Security of Signature Schemes
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models...
Alexander W. Dent, John Malone-Lee
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
14 years 3 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
EUROCRYPT
2008
Springer
13 years 11 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
DEXAW
2006
IEEE
165views Database» more  DEXAW 2006»
14 years 3 months ago
Design of a Web-Based Application for Wireless Sensor Networks
Wireless sensor networks (WSNs) are used for various ubiquitous and pervasive environments. A few common applications are security, agriculture, automation, and environmental moni...
Sajid Hussain, Nick Schofield, Abdul Wasey Matin