Sciweavers

5722 search results - page 67 / 1145
» Security Function Interactions
Sort
View
CCS
2003
ACM
14 years 2 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
JOCN
2010
103views more  JOCN 2010»
13 years 3 months ago
Functional Neuroimaging Can Support Causal Claims about Brain Function
Cognitive neuroscientists habitually deny that functional neuroimaging can furnish causal information about the relationship between brain events and behavior. However, imaging st...
Matthew J. Weber, Sharon L. Thompson-Schill
SPW
2005
Springer
14 years 2 months ago
Experiences with Host-to-Host IPsec
This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the d...
Tuomas Aura, Michael Roe, Anish Mohammed
ASIACRYPT
2000
Springer
14 years 1 months ago
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message us...
Jean-Sébastien Coron, François Koeun...
SIGMOD
2009
ACM
228views Database» more  SIGMOD 2009»
14 years 9 months ago
Interactive anonymization of sensitive data
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke