Sciweavers

7 search results - page 2 / 2
» On the Automated Correction of Security Protocols Susceptibl...
Sort
View
ICISS
2007
Springer
13 years 11 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
FC
2006
Springer
108views Cryptology» more  FC 2006»
13 years 9 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion