Sciweavers

3088 search results - page 554 / 618
» Multichannel Security Protocols
Sort
View
OSDI
2000
ACM
14 years 13 days ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
ASIAN
2009
Springer
299views Algorithms» more  ASIAN 2009»
14 years 6 days ago
Deducibility Constraints
In their work on tractable deduction systems, D. McAllester and later D. Basin and H. Ganzinger have identified a property of inference systems (the locality property) that ensures...
Sergiu Bursuc, Hubert Comon-Lundh, Stéphani...
SIGCOMM
2010
ACM
13 years 11 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
COMCOM
2006
75views more  COMCOM 2006»
13 years 11 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin
ECRA
2007
69views more  ECRA 2007»
13 years 11 months ago
NetPay: An off-line, decentralized micro-payment system for thin-client applications
Micro-payment systems have become popular in recent times as the desire to support low-value, high-volume transactions of text, music, clip-art, video and other media has increase...
Xiaoling Dai, John C. Grundy