Sciweavers

1795 search results - page 303 / 359
» Security Models and Information Flow
Sort
View
DBSEC
2006
134views Database» more  DBSEC 2006»
13 years 9 months ago
Notarized Federated Identity Management for Web Services
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
WSC
2004
13 years 9 months ago
Operational Analysis Framework for Emergency Operations Center Preparedness Training
As the U.S. Department of Homeland Security works to create an integrated emergency response system, it is evident that computer-based solutions can support this process. Individu...
Eytan Pollak, Mark Falash, Lorie Ingraham, Vivian ...
FOCS
2004
IEEE
13 years 11 months ago
Universally Composable Protocols with Relaxed Set-Up Assumptions
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally Composable (UC) protocols provide th...
Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafa...
JCP
2008
119views more  JCP 2008»
13 years 7 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
CHI
2005
ACM
14 years 8 months ago
Extending tangible interfaces for education: digital montessori-inspired manipulatives
This paper introduces a new framework for thinking about tangible interfaces in education, with specific focus on problem domains. Manipulatives are physical objects specifically ...
Oren Zuckerman, Saeed Arida, Mitchel Resnick