Sciweavers

346 search results - page 59 / 70
» Security Arguments for Digital Signatures and Blind Signatur...
Sort
View
IPPS
2003
IEEE
14 years 1 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
ENTCS
2007
129views more  ENTCS 2007»
13 years 8 months ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
SACMAT
2004
ACM
14 years 2 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
IEEEMSP
2002
IEEE
125views Multimedia» more  IEEEMSP 2002»
14 years 1 months ago
Wireless multimedia error resilience via a data hiding technique
Abstract—Transmission of digital contents in unavoidable noiseprone environments demands sophisticated error detection and concealment techniques to restore the perceptual qualit...
Chun-Shien Lu
INDOCRYPT
2001
Springer
14 years 1 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer