Sciweavers

1656 search results - page 106 / 332
» Secure Computation Without Authentication
Sort
View
ICCS
2004
Springer
14 years 4 months ago
Trusted Group Membership Service for JXTA
This paper presents Group Membership Service for JXTA extended with single or bi-directional authentication. The proposed solution exploits certificates and PKI (Public Key Infrast...
Lukasz Kawulok, Krzysztof Zielinski, Michal Jaesch...
SAC
2005
ACM
14 years 4 months ago
Scalable security and accounting services for content-based publish/subscribe systems
Content-based publish/subscribe systems offer an interaction scheme that is appropriate for a variety of large scale dynamic applications. However, widespread use of these systems...
Himanshu Khurana
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
14 years 3 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 10 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
NDSS
1997
IEEE
14 years 3 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin