Sciweavers

7741 search results - page 50 / 1549
» Security in Active Networks
Sort
View
ACSW
2007
13 years 10 months ago
A Range Test Secure in the Active Adversary Model
In ACISP 2006, Peng et al proposed a novel range test technique, which tests whether the integer encrypted in a ciphertext is in an interval range. Their solution is more efficien...
Kun Peng, Ed Dawson
ISSA
2008
13 years 10 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
ER
1998
Springer
147views Database» more  ER 1998»
14 years 1 months ago
An Active Conceptual Model for Fixed Income Securities Analysis for Multiple Financial Institutions
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...
Allen Moulton, Stéphane Bressan, Stuart E. ...
ICISC
2001
98views Cryptology» more  ICISC 2001»
13 years 10 months ago
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks
In this paper, we propose a multi-signature scheme, in which each signer can express her intention associating with the message to be signed. Signers' intentions mean a kind o...
Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsu...
INFOCOM
2012
IEEE
11 years 11 months ago
STROBE: Actively securing wireless communications using Zero-Forcing Beamforming
Abstract—We present the design and experimental evaluation of Simultaneous TRansmission with Orthogonally Blinded Eavesdroppers (STROBE). STROBE is a cross-layer approach that ex...
Narendra Anand, Sung-Ju Lee, Edward W. Knightly