Sciweavers

19003 search results - page 121 / 3801
» We Need Assurance!
Sort
View
TC
1998
13 years 8 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
ESORICS
2009
Springer
14 years 9 months ago
Type-Based Analysis of PIN Processing APIs
We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We s...
Matteo Centenaro, Riccardo Focardi, Flaminia L. Lu...
HICSS
2010
IEEE
131views Biometrics» more  HICSS 2010»
14 years 4 months ago
Using "Last-Minute" Sales for Vertical Differentiation on the Internet
In Internet based commerce, sellers often use multiple distribution channels for the sale of standard consumer goods. We study a model of second degree price discrimination in whi...
Ori Marom, Abraham Seidmann
ACISP
2008
Springer
14 years 3 months ago
Comparing the Pre- and Post-specified Peer Models for Key Agreement
In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the oth...
Alfred Menezes, Berkant Ustaoglu
ACSC
2007
IEEE
14 years 3 months ago
Jooj: Real-Time Support For Avoiding Cyclic Dependencies
The design guideline avoid dependency cycles among modules was first alluded to by Parnas in 1978. Many tools have since been built to detect cyclic dependencies among a program...
Hayden Melton, Ewan D. Tempero