130
click to vote
FC
15 years 8 months ago
2009 Springer
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
FC
15 years 8 months ago
2009 Springer
While a lot has changed in Internet security in the last 10 years, a lot has stayed the same – such as the use of alphanumeric passwords. Passwords remain the dominant means of a...
100
click to vote
FC
15 years 8 months ago
2009 Springer
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
101
click to vote
FC
15 years 8 months ago
2009 Springer
Abstract. We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information ...
106
click to vote
FC
15 years 8 months ago
2009 Springer
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
|