Sciweavers

2904 search results - page 66 / 581
» Internet Infrastructure Security
Sort
View
IPPS
2005
IEEE
14 years 3 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 4 months ago
Internet Users' Beliefs about Government Surveillance - The Role of Social Awareness and Internet Literacy
This study focuses on exploring Internet literacy and social awareness as antecedents to Internet users’ attitudes towards government surveillance in the Internet environment. P...
Tamara Dinev
CAV
2005
Springer
196views Hardware» more  CAV 2005»
14 years 3 months ago
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
Alessandro Armando, David A. Basin, Yohan Boichut,...