Sciweavers

26 search results - page 2 / 6
» ijisec 2006
Sort
View
IJISEC
2007
61views more  IJISEC 2007»
13 years 4 months ago
COVERAGE: detecting and reacting to worm epidemics using cooperation and validation
Kostas G. Anagnostakis, Michael B. Greenwald, Soti...
IJISEC
2010
85views more  IJISEC 2010»
13 years 3 months ago
EXAM: a comprehensive environment for the analysis of access control policies
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, ...
IJISEC
2007
58views more  IJISEC 2007»
13 years 4 months ago
Audit-based compliance control
J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, ...
IJISEC
2002
58views more  IJISEC 2002»
13 years 4 months ago
A complete characterization of a family of key exchange protocols
Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a one-bit secret key which is informationtheoretically secure from t...
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
IJISEC
2007
88views more  IJISEC 2007»
13 years 4 months ago
Secure group key establishment revisited
Abstract. We examine the popular proof models for group key establishment of Bresson et al. [BCPQ01,BCP01] and point out missing security properties addressing malicious protocol p...
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, ...