Sciweavers

897 search results - page 59 / 180
» Security Requirements for RFID Computing Systems
Sort
View
GRC
2007
IEEE
14 years 2 months ago
Secure Similarity Search
— One of the most substantial ways to protect users’ sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has bee...
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn ...
AINA
2011
IEEE
12 years 11 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
ARCS
2006
Springer
13 years 12 months ago
Safety, Liveness, and Information Flow: Dependability Revisited
Abstract: We present a formal framework to talk and reason about dependable systems. The framework is based on three distinct classes of (system specification) properties we call s...
Zinaida Benenson, Felix C. Freiling, Thorsten Holz...
DRM
2003
Springer
14 years 1 months ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
IPTPS
2004
Springer
14 years 1 months ago
Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks
We propose a new cryptographic technique, Acknowledgment Compression, permitting senders of multicast data to verify that all interested parties have either received the data or l...
Antonio Nicolosi, David Mazières