Sciweavers

731 search results - page 20 / 147
» Special Section on Information and Communication System Secu...
Sort
View
USENIX
1994
13 years 10 months ago
SNP: An Interface for Secure Network Programming
SNP provides a high-level abstraction for secure end-toend network communications. It supports both stream and datagram semantics with security guarantees (e.g., data originauthen...
Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su...
SAC
2006
ACM
14 years 2 months ago
Trust-decisions on the base of maximal information of recommended direct-trust
Nowadays the concept of trust in computer communications starts to get more and more popular. While the idea of trust in human interaction seems to be obvious and understandable i...
Uwe Roth, Volker Fusenig
P2P
2006
IEEE
14 years 2 months ago
Route Fingerprinting in Anonymous Communications
Peer discovery and route set-up are an integral part of the processes by which anonymizing peer-to-peer systems are made secure. When systems are large, and individual nodes only ...
George Danezis, Richard Clayton
IJWBC
2007
99views more  IJWBC 2007»
13 years 8 months ago
Exploring mobile information systems for chronically ill adolescent patients
: Adolescent cancer patients have to deal with many dependencies and obligations. Very often they are torn out of their social environment and become isolated because of changing t...
Jan Marco Leimeister, Uta Franziska Knebel, Helmut...
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
14 years 1 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras