Sciweavers

859 search results - page 67 / 172
» Security for Key Management Interfaces
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
SRDS
2003
IEEE
14 years 3 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
WISEC
2009
ACM
14 years 4 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
SPIRE
2001
Springer
14 years 2 months ago
Adding Security to Compressed Information Retrieval Systems
Word-based Huffman coding has widespread use in information retrieval systems. Besides its compressing power, it also enables the implementation of both indexing and searching sch...
Ruy Luiz Milidiú, C. Gomes de Mello, J. Fer...
CHI
1994
ACM
14 years 2 months ago
Model-based interface development
rom abstract objects like user tasks. ost interface development problems can be traced to two sources: the need for usercentered design environments and the lack of software system...
Angel R. Puerta, Pedro Szkeley