Sciweavers

5665 search results - page 244 / 1133
» Introduction to Computer Security
Sort
View
CCGRID
2004
IEEE
14 years 2 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura
CCS
2006
ACM
14 years 2 months ago
Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Fe...
CSREASAM
2010
13 years 8 months ago
A Hacking View of Access Control
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
Pedro Diaz-Gomez, Gregory Steen
ICSAP
2010
13 years 8 months ago
Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data
Security being the major concern during data transfers, we have various challenges to face. The requirements of the security model vary depending on the type of data to be encrypte...
R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunas...
IWCMC
2009
ACM
14 years 5 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth