Sciweavers

2904 search results - page 49 / 581
» Internet Infrastructure Security
Sort
View
WWW
2001
ACM
14 years 10 months ago
Establishing Persistent Identity using the Handle System
In this paper, we propose that identity reference used over distributed communication should be defined independent from any attributes and/or the public keys associated with the ...
Sam X. Sun
WWW
2008
ACM
14 years 10 months ago
Protecting the web: phishing, malware, and other security threats
Greg Aaron, Katharine A. Bostik, Rod Rasmussen, Ed...
WWW
2002
ACM
14 years 10 months ago
A lightweight protocol for the generation and distribution of secure e-coupons
Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
IPPS
2003
IEEE
14 years 3 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
ACSAC
2000
IEEE
14 years 2 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini