Sciweavers

729 search results - page 115 / 146
» Towards Secure e-Services
Sort
View
HICSS
2007
IEEE
171views Biometrics» more  HICSS 2007»
13 years 11 months ago
Unified Architecture for Large-Scale Attested Metering
We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consu...
Michael LeMay, George Gross, Carl A. Gunter, Sanja...
CRYPTO
2006
Springer
88views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
Let H1, H2 be two hash functions. We wish to construct a new hash function H that is collision resistant if at least one of H1 or H2 is collision resistant. Concatenating the outpu...
Dan Boneh, Xavier Boyen
ECAI
2006
Springer
13 years 11 months ago
Advanced Policy Explanations on the Web
Abstract. The frameworks for protecting security and privacy can be effective only if common users--with no training in computer science or logic--increase their awareness and cont...
Piero A. Bonatti, Daniel Olmedilla, Joachim Peer
IWEC
2008
13 years 9 months ago
Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment
The ability to simulate a seaport environment, including illicit cargo and the sensors designed to detect such cargo, allows the evaluation of alternative detection methods in orde...
Allen Christiansen, Damian Johnson, Lawrence B. Ho...
IC
2004
13 years 9 months ago
TOP: A Transport Overlay Protocol for Peer-to-Peer Applications
In the next generation Internet, the network should not only be considered as a communication medium but also as a large source of services which use entails performance, reliabil...
Thierry Rakotoarivelo, Patrick Sénac, Sebas...