Sciweavers

12637 search results - page 220 / 2528
» Security for Extensible Systems
Sort
View
AICT
2006
IEEE
128views Communications» more  AICT 2006»
14 years 3 months ago
Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers
IP Telephony based on Peer-to-Peer (P2P) technology has being gaining attentions for its innovative approach to providing VoIP service. At the same time, it has raised many new re...
Feng Cao, David A. Bryan, Bruce Lowekamp
ETFA
2005
IEEE
14 years 3 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
CAU
2004
192views Cryptology» more  CAU 2004»
13 years 11 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
EVOTING
2004
113views Hardware» more  EVOTING 2004»
13 years 11 months ago
E-Voting and Biometric Systems
: As e-Voting gains more importance while practicable solutions are being implemented, more questions arise concerning alternative possibilities for a secure and feasible authentic...
Sonja Hof
WWW
2009
ACM
14 years 10 months ago
PAKE-based mutual HTTP authentication for preventing phishing attacks
We developed a new Web authentication protocol with passwordbased mutual authentication which prevents various kinds of phishing attacks. This protocol provides a protection of us...
Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hi...