Sciweavers

434 search results - page 12 / 87
» Security Documentation
Sort
View
WISTP
2007
Springer
14 years 1 months ago
Securing the Distribution and Storage of Secrets with Trusted Platform Modules
Abstract. We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eaves...
Paul E. Sevinç, Mario Strasser, David A. Ba...
CCS
2001
ACM
14 years 1 days ago
Tangler: a censorship-resistant publishing system based on document entanglements
We describe the design of a censorship-resistant system that employs a unique document storage mechanism. Newly published documents are dependent on the blocks of previously publi...
Marc Waldman, David Mazières
CCS
2003
ACM
14 years 23 days ago
Print signatures for document authentication
We present a novel solution for authenticating printed paper documents by utilizing the inherent non–repeatable randomness existing in the printing process. For a document print...
Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli
SEDE
2010
13 years 5 months ago
Security Controls Applied to Web Service Architectures
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST...
Robert Baird, Rose F. Gamble
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
14 years 2 months ago
Fingerprinting Blank Paper Using Commodity Scanners
This paper presents a novel technique for authenticating physical documents based on random, naturally occurring imperfections in paper texture. We introduce a new method for meas...
William Clarkson, Tim Weyrich, Adam Finkelstein, N...