Sciweavers

2270 search results - page 129 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
WETICE
2009
IEEE
14 years 3 months ago
A Game Theoretical Approach in Securing P2P Storage against Whitewashers
—An inherent problem to a cooperation incentive mechanism implemented into a dynamic system where peers may join or leave at any time is the whitewashing problem. Whitewashers ar...
Nouha Oualha, Yves Roudier
MEMBRANE
2009
Springer
14 years 3 months ago
Conformon P Systems and Topology of Information Flow
would be an abstract answer (because it would not immediately link a formal model with the biological reality that inspired it or with possible implementations) from the other hand...
Pierluigi Frisco
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
14 years 3 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
NDSS
2005
IEEE
14 years 2 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
EUROCRYPT
1998
Springer
14 years 1 months ago
Strengthened Security for Blind Signatures
Abstract. Provable security is a very nice property for cryptographic protocols. Unfortunately, in many cases, this is at the cost of a considerable loss in terms of efficiency. Mo...
David Pointcheval