Sciweavers

2270 search results - page 129 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
WETICE
2009
IEEE
15 years 10 months ago
A Game Theoretical Approach in Securing P2P Storage against Whitewashers
—An inherent problem to a cooperation incentive mechanism implemented into a dynamic system where peers may join or leave at any time is the whitewashing problem. Whitewashers ar...
Nouha Oualha, Yves Roudier
133
Voted
MEMBRANE
2009
Springer
15 years 10 months ago
Conformon P Systems and Topology of Information Flow
would be an abstract answer (because it would not immediately link a formal model with the biological reality that inspired it or with possible implementations) from the other hand...
Pierluigi Frisco
143
Voted
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
15 years 9 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
141
Voted
NDSS
2005
IEEE
15 years 9 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
EUROCRYPT
1998
Springer
15 years 7 months ago
Strengthened Security for Blind Signatures
Abstract. Provable security is a very nice property for cryptographic protocols. Unfortunately, in many cases, this is at the cost of a considerable loss in terms of efficiency. Mo...
David Pointcheval