Sciweavers

1795 search results - page 114 / 359
» Security Models and Information Flow
Sort
View
114
Voted
DRM
2009
Springer
15 years 10 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriï¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
SLOGICA
2008
101views more  SLOGICA 2008»
15 years 3 months ago
A Dynamic-Logical Perspective on Quantum Behavior
In this paper we show how recent concepts from Dynamic Logic, and in particular from Dynamic Epistemic logic, can be used to model and interpret quantum behavior. Our main thesis ...
Alexandru Baltag, Sonja Smets
143
Voted
ICN
2005
Springer
15 years 9 months ago
A Practical and Secure Communication Protocol in the Bounded Storage Model
Proposed by Maurer the bounded storage model has received much academic attention in the recent years. Perhaps the main reason for this attention is that the model facilitates a un...
Erkay Savas, Berk Sunar
NSPW
2006
ACM
15 years 9 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
SEC
2007
15 years 5 months ago
Exploratory survey on an Evaluation Model for a Sense of Security
Research in information security is no longer limited to technical issues: human-related issues such as trust and the sense of security are also required by the user. In this paper...
Natsuko Hikage, Yuko Murayama, Carl Hauser