Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
IJISEC
2007
61views more  IJISEC 2007»
10 years 4 months ago
COVERAGE: detecting and reacting to worm epidemics using cooperation and validation
Kostas G. Anagnostakis, Michael B. Greenwald, Soti...
IJISEC
2007
87views more  IJISEC 2007»
10 years 4 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
IJISEC
2007
66views more  IJISEC 2007»
10 years 4 months ago
Protecting data privacy through hard-to-reverse negative databases
The paper extends the idea of negative representations of information for enhancing privacy. Simply put, a set DB of data elements can be represented in terms of its complement set...
Fernando Esponda, Elena S. Ackley, Paul Helman, Ha...
IJISEC
2007
149views more  IJISEC 2007»
10 years 4 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
IJISEC
2007
61views more  IJISEC 2007»
10 years 4 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
IJISEC
2007
58views more  IJISEC 2007»
10 years 4 months ago
Audit-based compliance control
J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, ...
IJISEC
2007
119views more  IJISEC 2007»
10 years 4 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
IJISEC
2007
63views more  IJISEC 2007»
10 years 4 months ago
A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems
In electronic marketplaces, trust is modeled, for instance, in order to allow buying agents to make effective selection of selling agents. Familiarity is often considered to be an ...
Jie Zhang, Ali A. Ghorbani, Robin Cohen
IJISEC
2007
88views more  IJISEC 2007»
10 years 4 months ago
Secure group key establishment revisited
Abstract. We examine the popular proof models for group key establishment of Bresson et al. [BCPQ01,BCP01] and point out missing security properties addressing malicious protocol p...
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, ...
IJISEC
2007
55views more  IJISEC 2007»
10 years 4 months ago
A system for securing push-based distribution of XML documents
Elisa Bertino, Elena Ferrari, Federica Paci, Lored...
books