Sciweavers

1790 search results - page 257 / 358
» On Privacy Models for RFID
Sort
View
121
Voted
CCS
2007
ACM
15 years 9 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
143
Voted
CCS
2007
ACM
15 years 9 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
ESORICS
2007
Springer
15 years 9 months ago
Encryption Techniques for Secure Database Outsourcing
Abstract. While the idea of database outsourcing is becoming increasingly popular, the associated security risks still prevent many potential users from deploying it. In particular...
Sergei Evdokimov, Oliver Günther
123
Voted
ESORICS
2007
Springer
15 years 9 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
127
Voted
EUC
2007
Springer
15 years 9 months ago
An Activity-Centered Wearable Computing Infrastructure for Intelligent Environment Applications
There are many research efforts that focus on converting everyday environments into intelligent and computationally active environments that support and enhance the abilities of it...
Dipak Surie, Thomas Pederson