Sciweavers

986 search results - page 80 / 198
» Protecting the Intranet Against
Sort
View
CCGRID
2007
IEEE
14 years 3 months ago
Redundancy Management for P2P Storage
P2P storage systems must protect data against temporary unavailability and the effects of churn in order to become platforms for safe storage. This paper evaluates and compares re...
Chris Williams, Philippe Huibonhoa, JoAnne Hollida...
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
14 years 3 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch
ICMB
2005
IEEE
76views Business» more  ICMB 2005»
14 years 2 months ago
ZoneIT: Using Short-Range Radios to Control Mobile Device Functionality
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...
Tim Moors, Marvyn Mei, Agus Salim
SIGOPSE
2004
ACM
14 years 2 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
CCS
2004
ACM
14 years 2 months ago
Cryptanalysis of a provably secure CRT-RSA algorithm
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we...
David Wagner