Sciweavers

6137 search results - page 87 / 1228
» Securing Collaborative Applications
Sort
View
ACISP
2007
Springer
14 years 27 days ago
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biom...
Julien Bringer, Hervé Chabanne, Malika Izab...
SSS
2009
Springer
14 years 3 months ago
A Wireless Security Framework without Shared Secrets
This paper develops a framework for wireless security that provides confidentiality, identity authentication, message authentication, integrity, sender non-repudiation, receiver n...
Lifeng Sang, Anish Arora
WWW
2004
ACM
14 years 9 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
ACSAC
2007
IEEE
14 years 3 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
EUC
2006
Springer
14 years 17 days ago
Security in P2P Networks: Survey and Research Directions
A fundamental feature of Peer-to-Peer (P2P) networks is the honest collaboration among an heterogeneous community of participants. After Napster success
Esther Palomar, Juan M. Estévez-Tapiador, J...