Sciweavers

731 search results - page 57 / 147
» Special Section on Information and Communication System Secu...
Sort
View
ISI
2007
Springer
14 years 3 months ago
Architecture for an Automatic Customized Warning System
Abstract—Public communication during natural and manmade disasters is a key issue that must be addressed to protect lives and properties. The choice of the best protective action...
Mirko Montanari, Sharad Mehrotra, Nalini Venkatasu...
EUROSYS
2011
ACM
13 years 13 days ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...
SOUPS
2006
ACM
14 years 2 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
CCS
2007
ACM
14 years 3 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
ACMSE
2007
ACM
14 years 29 days ago
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we o...
Xinliang Zheng, Chin-Tser Huang, Manton M. Matthew...