Sciweavers

1875 search results - page 332 / 375
» Modeling the Security of Steganographic Systems
Sort
View
NDSS
2003
IEEE
14 years 3 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesā€”the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
XMLSEC
2003
ACM
14 years 3 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from diļ¬€erent enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 8 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
SIGCOMM
2012
ACM
12 years 11 days ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Conļ¬guration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 4 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...