Sciweavers

5665 search results - page 44 / 1133
» Introduction to Computer Security
Sort
View
WOWMOM
2005
ACM
99views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Small Worlds and the Security of Ubiquitous Computing
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...
Harald Vogt
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
13 years 8 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
SEC
1993
13 years 10 months ago
Teaching Computer Security
This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
Matt Bishop
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 8 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
ISI
2006
Springer
13 years 8 months ago
A Trust-Based Security Architecture for Ubiquitous Computing Systems
Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van...