Sciweavers

2261 search results - page 72 / 453
» Dynamic types for authentication
Sort
View
WETICE
1998
IEEE
14 years 1 months ago
Efficient Security for Large and Dynamic Multicast Groups
Proposals for multicast security that have been published so far are complex, often require trust in network components or are inefficient. In this paper we propose a series of no...
Germano Caronni, Marcel Waldvogel, Dan Sun, Bernha...
IWPC
1997
IEEE
14 years 13 days ago
Dynamic Program Slicing in Understanding of Program Execution
A dynamic program slice is an executable part of a program whose behavior is identical, for the same program input, to that of an original program with respect to a variable(s) of...
Bogdan Korel, Juergen Rilling
ACMSE
2006
ACM
14 years 2 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
ESORICS
2009
Springer
14 years 23 days ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
RFIDSEC
2010
13 years 7 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...