Sciweavers

3149 search results - page 223 / 630
» IT security risk management
Sort
View
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
14 years 4 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
CSFW
2007
IEEE
14 years 4 months ago
A Formal Theory of Key Conjuring
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Véronique Cortier, Stéphanie Delaune...
SP
1996
IEEE
118views Security Privacy» more  SP 1996»
14 years 1 months ago
A Fair Non-repudiation Protocol
: This paper examines the Zhou-Gollmann fair non-repudiation protocol as well as its modified version of Kim et al. We describe how these protocols are vulnerable to an attack by a...
Jianying Zhou, Dieter Gollmann
DELTA
2008
IEEE
13 years 11 months ago
On Using Fingerprint-Sensors for PIN-Pad Entry
Automatic fingerprint authentication is an integral part in many security systems. Because not every person is always suited to that technology, a general purpose security system ...
Marcel Jacomet, Josef Goette, Andreas Eicher
COMCOM
2000
143views more  COMCOM 2000»
13 years 9 months ago
Further analysis of the Internet key exchange protocol
Secure communication over the Internet becomes an essential requirement for any value-added Internet application. The use of cryptography for secure communication brings out the r...
Jianying Zhou