Sciweavers

189 search results - page 18 / 38
» On Unconditionally Secure Computation with Vanishing Communi...
Sort
View
ICICS
2009
Springer
14 years 3 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
EUROSYS
2011
ACM
12 years 12 months ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
14 years 2 months ago
An Experimental Study on Energy Consumption of Video Encryption for Mobile Handheld Devices
Abstract Secure video communication on mobile handheld devices is challenging mainly due to (a) the significant computational needs of both video coding and encryption algorithms ...
Kyoungwoo Lee, Nikil Dutt, Nalini Venkatasubramani...
COMCOM
2008
104views more  COMCOM 2008»
13 years 8 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
NGC
2000
Springer
14 years 3 hour ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi