Sciweavers

1407 search results - page 110 / 282
» Systems Theory Model for Information Security
Sort
View
IACR
2011
129views more  IACR 2011»
12 years 7 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
CMS
2003
171views Communications» more  CMS 2003»
13 years 9 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
JSW
2007
116views more  JSW 2007»
13 years 8 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
MKM
2009
Springer
14 years 22 days ago
Spreadsheet Interaction with Frames: Exploring a Mathematical Practice
Since Mathematics really is about what mathematicians do, in this paper, we will look at the mathematical practice of framing, in which an object of interest is viewed in terms of ...
Andrea Kohlhase, Michael Kohlhase
SIGCOMM
2010
ACM
13 years 8 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker