Sciweavers

343 search results - page 26 / 69
» The All-In Publication Policy
Sort
View
DGO
2007
133views Education» more  DGO 2007»
14 years 12 days ago
Law and governance and virtual worlds
This panel will survey the virtual world phenomena, introduce the governance issues that arise there and suggests why the digital government community can both contribute to virtu...
Ethan Katsh, Alan Gaitenby, Norman K. Sondheimer
JSW
2008
122views more  JSW 2008»
13 years 11 months ago
Security of Distributed Digital Criminal Dossiers
Abstract-- Securely managing shared information in distributed environments across multiple organisations is a challenge. Distributed information management systems must be able to...
Martijn Warnier, Frances M. T. Brazier, Anja Oskam...
ASIACRYPT
2000
Springer
14 years 3 months ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung
OSDI
1996
ACM
14 years 8 days ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
FC
2009
Springer
109views Cryptology» more  FC 2009»
14 years 5 months ago
Optimised to Fail: Card Readers for Online Banking
Abstract. The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used toge...
Saar Drimer, Steven J. Murdoch, Ross J. Anderson