Sciweavers

3452 search results - page 85 / 691
» Secure Data Outsourcing
Sort
View
IJOE
2008
98views more  IJOE 2008»
13 years 10 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
14 years 1 months ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg
VIZSEC
2004
Springer
14 years 3 months ago
PortVis: a tool for port-based detection of security events
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...
CCGRID
2008
IEEE
14 years 4 months ago
A Trusted Data Storage Infrastructure for Grid-Based Medical Applications
Most existing Grid technology has been foremost designed with performance and scalability in mind. When using Grid infrastructure for medical applications, privacy and security co...
Guido van 't Noordende, Sílvia Delgado Olab...
CIDR
2007
79views Algorithms» more  CIDR 2007»
13 years 11 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina