Sciweavers

478 search results - page 42 / 96
» Secure Sockets Layer
Sort
View
JUCS
2010
114views more  JUCS 2010»
13 years 2 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
FAST
2009
13 years 5 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
HOLOMAS
2007
Springer
14 years 1 months ago
Detecting Intrusions in Agent System by Means of Exception Handling
We present a formal approach to conception of a dedicated security infrastructure based on the exception handling in the protected agents. Securityrelated exceptions are identifie...
Eric Platon, Martin Rehák, Nicolas Sabouret...
CIS
2005
Springer
14 years 1 months ago
Survivability Computation of Networked Information Systems
Abstract. Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious en...
Xuegang Lin, Rongsheng Xu, Miaoliang Zhu
FSE
2003
Springer
228views Cryptology» more  FSE 2003»
14 years 25 days ago
Further Observations on the Structure of the AES Algorithm
We present our further observations on the structure of the AES algorithm relating to the cyclic properties of the functions used in this cipher. We note that the maximal period of...
Beomsik Song, Jennifer Seberry