Sciweavers

369 search results - page 63 / 74
» Security Attack Testing (SAT) - testing the security of info...
Sort
View
CCS
2001
ACM
14 years 1 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
IEEECIT
2009
IEEE
14 years 3 months ago
Dynamic Software Product Lines for Service-Based Systems
—Ageing populations and the necessity to reduce environmental impact raise new challenges on our living buildings. Convergence of home control systems (air conditioning, light ma...
Paul Istoan, Grégory Nain, Gilles Perrouin,...
CCS
2008
ACM
13 years 10 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
13 years 6 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
14 years 27 days ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu