Sciweavers

5665 search results - page 269 / 1133
» Introduction to Computer Security
Sort
View
ECOOPW
1999
Springer
14 years 3 months ago
Security Properties of Typed Applets
This paper formalizes the folklore result that strongly-typed applets are more secure than untyped ones. We formulate and prove several security properties that all well-typed app...
Xavier Leroy, François Rouaix
SEC
2003
14 years 4 days ago
Security, Fault-Tolerance and their Verification for Ambient Systems
For the emerging ambient environments, in which interconnected intelligent devices will surround us to increase the comfort of our lives, fault tolerance and security are of paramo...
Jaap-Henk Hoepman
SMC
2010
IEEE
121views Control Systems» more  SMC 2010»
13 years 9 months ago
Learning of personalized security settings
—While many cybersecurity tools are available to computer users, their default configurations often do not match needs of specific users. Since most modern users are not computer...
Mehrbod Sharifi, Eugene Fink, Jaime G. Carbonell
ISVC
2007
Springer
14 years 5 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
FC
2010
Springer
196views Cryptology» more  FC 2010»
14 years 2 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers