Sciweavers

1795 search results - page 101 / 359
» Security Models and Information Flow
Sort
View
136
Voted
CVPR
2009
IEEE
16 years 10 months ago
Contextual Flow
Matching based on local brightness is quite limited, because small changes on local appearance invalidate the constancy in brightness. The root of this limitation is its treatme...
Ying Wu (Northwestern University), Jialue Fan (Nor...
127
Voted
ESORICS
2009
Springer
15 years 7 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
158
Voted
EUROPKI
2009
Springer
15 years 1 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
155
Voted
CCS
2009
ACM
15 years 10 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
119
Voted
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
15 years 8 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront