Sciweavers

577 search results - page 3 / 116
» Engineering Sufficiently Secure Computing
Sort
View
ADAEUROPE
2006
Springer
14 years 4 months ago
Secure Execution of Computations in Untrusted Hosts
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...
WWW
2004
ACM
14 years 11 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
FSTTCS
2010
Springer
13 years 8 months ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
IVC
2008
93views more  IVC 2008»
13 years 10 months ago
A blind source separation-based method for multiple images encryption
Blind source separation (BSS) has been successfully applied to many fields such as communications and biomedical engineering. Its application for image encryption, however, remain...
Qiu-Hua Lin, Fuliang Yin, Tiemin Mei, Hualou Liang
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
14 years 2 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson