Sciweavers

38 search results - page 8 / 8
» On the Impossibility of Strong Encryption Over
Sort
View
CCS
2009
ACM
13 years 11 months ago
A metadata calculus for secure information sharing
In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to informa...
Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt
IE
2007
13 years 6 months ago
Sam Fisher versus Immanuel Kant: the ethics of interactive media
This paper explores the notion of ethical engagement in interactive media through an examination of the Splinter Cell series of games. Keywords Interactive Media, Ethics, Stealth ...
Scott Beattie
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
13 years 10 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty