Sciweavers

1770 search results - page 211 / 354
» Writing requirements in computer security
Sort
View
CCS
2006
ACM
14 years 2 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
WPES
2003
ACM
14 years 3 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
BMCBI
2010
149views more  BMCBI 2010»
13 years 10 months ago
S3DB core: a framework for RDF generation and management in bioinformatics infrastructures
Background: Biomedical research is set to greatly benefit from the use of semantic web technologies in the design of computational infrastructure. However, beyond well defined res...
Jonas S. Almeida, Helena F. Deus, Wolfgang Maass
NDSS
1998
IEEE
14 years 2 months ago
Distributed Algorithms for Attack Localization in All-Optical Networks
All-Optical Networks provide ultra-fast data rates, but present a new set of challenges for network security. We present a new algorithm for attack localization in networks. The a...
Ruth Bergman, Muriel Médard, Serena Chan
HUC
2007
Springer
14 years 2 months ago
Amigo: Proximity-Based Authentication of Mobile Devices
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices us...
Alex Varshavsky, Adin Scannell, Anthony LaMarca, E...