Sciweavers

3452 search results - page 71 / 691
» Secure Data Outsourcing
Sort
View
WSC
2007
14 years 8 days ago
A public health application of data analysis for homeland security
This presentation follows up the talk last year to WINFORMS (The Washington Institute for Operations Research and The Management Sciences) in which an approach developed for the a...
Marjorie Greene, Robert Eek
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
14 years 4 months ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya
IPPS
2007
IEEE
14 years 4 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
EUROCRYPT
2001
Springer
14 years 2 months ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe
DAC
1998
ACM
14 years 11 months ago
Data Security for Web-based CAD
Scott Hauck, Stephen Knol