Sciweavers

729 search results - page 101 / 146
» Towards Secure e-Services
Sort
View
CONCUR
2010
Springer
13 years 9 months ago
Trust in Anonymity Networks
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusi...
Vladimiro Sassone, Sardaouna Hamadou, Mu Yang
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
13 years 9 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio
JNW
2006
174views more  JNW 2006»
13 years 9 months ago
802.11i Encryption Key Distribution Using Quantum Cryptography
Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant ...
Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange G...
TELSYS
2008
98views more  TELSYS 2008»
13 years 9 months ago
Multicast deflector
Abstract Technological evolution is leading telecommunications toward all-IP scenarios, where multiple services are transported as IP packets. Among these services is the broadcast...
António Pinto, Manuel Ricardo
ACSAC
2010
IEEE
13 years 7 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel