Sciweavers

8644 search results - page 1638 / 1729
» On the Composition of Secure Systems
Sort
View
ICEIS
1999
IEEE
14 years 1 months ago
A New Method to Block Access to Illegal and Harmful Content on the Internet
: Filtering software is the most commonly used to protect children and young people from illegal and harmful contents on the Internet. Most of this software blocks access to Intern...
Byung-Jeon Yoo, Hyun-Gyoo Yook, Myong-Soon Park
EUROCRYPT
1999
Springer
14 years 1 months ago
Conditional Oblivious Transfer and Timed-Release Encryption
Abstract. We consider the problem of sending messages into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anon...
Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramak...
ICSE
1999
IEEE-ACM
14 years 1 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
ICDCS
1998
IEEE
14 years 1 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
NDSS
1998
IEEE
14 years 1 months ago
Efficient Protocols for Signing Routing Messages
In this work, we aim to reduce the computational costs of using public-key digital signatures in securing routing protocols. Two protocols (COSP and IOSP) using one-time digitalsi...
Kan Zhang
« Prev « First page 1638 / 1729 Last » Next »