116
Voted
FC
15 years 7 months ago
2009 Springer
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
91
Voted
FC
15 years 7 months ago
2009 Springer
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same – such as the use of alphanumeric passwords. Passwords remain the dominant means of a...
FC
15 years 7 months ago
2009 Springer
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
95
Voted
FC
15 years 7 months ago
2009 Springer
Abstract. We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information ...
FC
15 years 7 months ago
2009 Springer
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
|