Sciweavers

5722 search results - page 60 / 1145
» Security Function Interactions
Sort
View
CRYPTO
2005
Springer
107views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
A Quantum Cipher with Near Optimal Key-Recycling
Abstract. Assuming an insecure quantum channel and an authenticated classical channel, we propose an unconditionally secure scheme for encrypting classical messages under a shared ...
Ivan Damgård, Thomas Brochmann Pedersen 0002...
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
14 years 22 days ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
CSFW
2011
IEEE
12 years 8 months ago
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection
Abstract—Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely a...
Jeremiah Blocki, Nicolas Christin, Anupam Datta, A...
PET
2012
Springer
11 years 11 months ago
Exploring the Ecosystem of Referrer-Anonymizing Services
The constant expansion of the World Wide Web allows users to enjoy a wide range of products and services delivered directly to their browsers. At the same time however, this expans...
Nick Nikiforakis, Steven Van Acker, Frank Piessens...
EPEW
2006
Springer
14 years 12 days ago
A Function-Equivalent Components Based Simplification Technique for PEPA Models
PEPA has recently been extended with functional rates [1][2]. These functions allow the specification of indirect interaction between components in such a way that the rate of an a...
Jane Hillston, Leïla Kloul