Sciweavers

65 search results - page 11 / 13
» Fuzzy Argumentation for Trust
Sort
View
ICICS
2009
Springer
14 years 9 days ago
Biometric-Based Non-transferable Anonymous Credentials
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonym...
Marina Blanton, William M. P. Hudelson
WWW
2010
ACM
14 years 22 days ago
Highlighting disputed claims on the web
We describe Dispute Finder, a browser extension that alerts a user when information they read online is disputed by a source that they might trust. Dispute Finder examines the tex...
Rob Ennals, Beth Trushkowsky, John Mark Agosta
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
14 years 3 days ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
13 years 10 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
13 years 10 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung