Sciweavers

2846 search results - page 133 / 570
» Not one click for security
Sort
View
130
Voted
ASIACRYPT
2006
Springer
15 years 8 months ago
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the a...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
USS
2008
15 years 7 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
ISSA
2008
15 years 6 months ago
Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Stud
This paper intends to discuss and sift out current and important challenges in Information and Communication Technology (ICT) security for developing countries in the Sub-Saharan ...
Geoffrey Karokola, Louise Yngström
138
Voted
CSREASAM
2006
15 years 6 months ago
Adaptive Security Metrics for Computer Systems
The major concern for a computer system is its security and integrity. It is necessary to check the security level of your system and keep it updated. This can be best achieved by ...
Satish Baddelpeli, Gregory Vert
135
Voted
I3E
2001
126views Business» more  I3E 2001»
15 years 6 months ago
Symbolon - A Novel Concept For Secure e-Commerce
Electronic-banking applications (EBAs) are among the pioneers of electroniccommerce (e-commerce) applications. Like other e-commerce applications, they require sophisticated secur...
Sebastian Fischmeister, Günther Hagleitner, W...