Sciweavers

5722 search results - page 33 / 1145
» Security Function Interactions
Sort
View
IEEESP
2010
46views more  IEEESP 2010»
13 years 7 months ago
New Security Architectures Based on Emerging Disk Functionality
Kevin R. B. Butler, Stephen E. McLaughlin, Thomas ...
ASIACRYPT
2000
Springer
14 years 1 months ago
Zero-Knowledge and Code Obfuscation
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not ...
Satoshi Hada
FC
2004
Springer
78views Cryptology» more  FC 2004»
14 years 2 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
13 years 11 months ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee