Sciweavers

218 search results - page 12 / 44
» Voice-over-IP Security: Research and Practice
Sort
View
EUROCRYPT
2003
Springer
14 years 1 months ago
Why Provable Security Matters?
Abstract. Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging...
Jacques Stern
MSR
2011
ACM
12 years 11 months ago
Security versus performance bugs: a case study on Firefox
A good understanding of the impact of different types of bugs on various project aspects is essential to improve software quality research and practice. For instance, we would ex...
Shahed Zaman, Bram Adams, Ahmed E. Hassan
ANTS
2006
Springer
101views Algorithms» more  ANTS 2006»
14 years 5 days ago
High Security Pairing-Based Cryptography Revisited
The security and performance of pairing based cryptography has provoked a large volume of research, in part because of the exciting new cryptographic schemes that it underpins. We ...
Robert Granger, Dan Page, Nigel P. Smart
ISTA
2007
13 years 9 months ago
Return on Security Investments - Design Principles of Measurement Systems Based on Capital Budgeting
: IT-security has become a vital factor in electronic commerce nowadays. Thus, investments have to be made in order to safeguard security. However, the benefits of these investment...
Jan vom Brocke, Gereon Strauch, Christian Buddendi...
FC
2003
Springer
133views Cryptology» more  FC 2003»
14 years 1 months ago
Secure Generalized Vickrey Auction Using Homomorphic Encryption
Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a com...
Koutarou Suzuki, Makoto Yokoo