Sciweavers

1627 search results - page 155 / 326
» High Security Smartcards
Sort
View
TDSC
2010
172views more  TDSC 2010»
14 years 11 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
ICONFERENCE
2012
14 years 7 days ago
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
Blase Ur, Yang Wang
HICSS
2010
IEEE
157views Biometrics» more  HICSS 2010»
15 years 11 months ago
Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols
Recently, there has been an increased focus and a sense of urgency in developing standards for Power Grid systems centered on the need for interoperability. Given the threat again...
Himanshu Khurana, Rakeshbabu Bobba, Timothy M. Yar...
PET
2009
Springer
15 years 11 months ago
RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests
Many requests that a Web browser makes are not made to the primary site a user is visiting. It is common for websites to instruct browsers to make additional requests to third-part...
Justin Samuel, Beichuan Zhang
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
15 years 11 months ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...