Sciweavers

2846 search results - page 83 / 570
» Not one click for security
Sort
View
COOPIS
2004
IEEE
15 years 8 months ago
Security Management Through Overloading Views
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of dat...
Radoslaw Adamus, Kazimierz Subieta
CTRSA
2008
Springer
134views Cryptology» more  CTRSA 2008»
15 years 6 months ago
An Efficient Protocol for Fair Secure Two-Party Computation
In the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withstanding semi-honest adversaries, which is based on so-called garbled circuits...
Mehmet S. Kiraz, Berry Schoenmakers
JMM2
2008
84views more  JMM2 2008»
15 years 4 months ago
A Localized and Secure Method for Transferring Bank Information by SMS for Persian Banks
Nowadays m-banking (mobile banking) is widely used in many banks. It has embarked upon supply of various services based on different systems and with the aid of various services su...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
JSS
2006
66views more  JSS 2006»
15 years 4 months ago
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security ...
Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
IFIP
2010
Springer
14 years 11 months ago
Reasoning about Probabilistic Security Using Task-PIOAs
Abstract. Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framewo...
Aaron D. Jaggard, Catherine Meadows, Michael Mislo...