Sciweavers

1663 search results - page 2 / 333
» Computer Security in the Real World
Sort
View
NSPW
2006
ACM
13 years 11 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann
RAID
2010
Springer
13 years 3 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
APCHI
2004
IEEE
13 years 9 months ago
Real-World Oriented Access Control Method with a Displayed Password
Abstract. Access control within a ubiquitous networking environment is a critical issue. Traditional access control methods have mainly relied on the authentication of registered u...
Yuji Ayatsuka, Michimune Kohno, Jun Rekimoto
EUROPKI
2005
Springer
13 years 10 months ago
Modeling Public Key Infrastructures in the Real World
John Marchesini, Sean W. Smith