Sciweavers

4111 search results - page 98 / 823
» Security, Protocols, and Trust
Sort
View
WETICE
2005
IEEE
14 years 3 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
ENTCS
2008
87views more  ENTCS 2008»
13 years 10 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
CCS
2003
ACM
14 years 3 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
TOIT
2008
92views more  TOIT 2008»
13 years 10 months ago
Security and identification indicators for browsers against spoofing and phishing attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages...
Amir Herzberg, Ahmad Jbara
ESAS
2007
Springer
14 years 4 months ago
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators
The Direct Anonymous Attestation (DAA) scheme provides a means for remotely authenticating a trusted platform whilst preserving the user’s privacy. The protocol has been adopted ...
Ben Smyth, Mark Ryan, Liqun Chen