Sciweavers

166 search results - page 9 / 34
» Protecting Applications with Transient Authentication
Sort
View
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
14 years 1 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
MHCI
2009
Springer
14 years 3 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
SCN
2010
Springer
147views Communications» more  SCN 2010»
13 years 7 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
HICSS
2007
IEEE
86views Biometrics» more  HICSS 2007»
14 years 3 months ago
Visualization and Characterization of Stability Swings via GPS-Synchronized Data
: This paper provides a methodology to characterize the accuracy of PMU data (GPS-synchronized) and the applicability of this data for monitoring system stability via visualization...
George J. Cokkinides, A. P. Sakis Meliopoulos, Geo...
TMC
2012
11 years 11 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright