Sciweavers

386 search results - page 60 / 78
» Practical Security in Public-Key Cryptography
Sort
View
IJNSEC
2010
146views more  IJNSEC 2010»
13 years 5 months ago
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and mcommerce channe...
Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivek...
POLICY
2009
Springer
14 years 5 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 9 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
FIW
2009
120views Communications» more  FIW 2009»
13 years 8 months ago
Software Security Vulnerabilities Seen As Feature Interactions
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Guy-Vincent Jourdan
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
14 years 5 months ago
Integrity Protection for Revision Control
Abstract. Users of online-collaboration tools and network storage services place considerable trust in their providers. This paper presents a novel approach for protecting data int...
Christian Cachin, Martin Geisler