Sciweavers

1190 search results - page 92 / 238
» Secure off-the-record messaging
Sort
View
ISPEC
2005
Springer
15 years 10 months ago
An Email Worm Vaccine Architecture
We present an architecture for detecting “zero-day” worms and viruses in incoming email. Our main idea is to intercept every incoming message, prescan it for potentially danger...
Stelios Sidiroglou, John Ioannidis, Angelos D. Ker...
AGENTS
2000
Springer
15 years 9 months ago
Exchanging tacit community knowledge by talking-virtualized-egos
This paper describes a method of exchanging tacit community knowledge using talking-virtualized-egos. We aim at sharing tacit knowledge in a community, for this purpose, we propos...
Hidekazu Kubota, Toyoaki Nishida, Tomoko Koda
SIGOPSE
2004
ACM
15 years 10 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...
FROCOS
2007
Springer
15 years 11 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
136
Voted
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
15 years 10 months ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell