Sciweavers

3420 search results - page 157 / 684
» A Language-Based Approach to Security
Sort
View
ATAL
2009
Springer
15 years 10 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
137
Voted
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 10 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
EUROCRYPT
2010
Springer
15 years 9 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 9 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
109
Voted
ICECCS
2002
IEEE
99views Hardware» more  ICECCS 2002»
15 years 9 months ago
Using Aspects to Design a Secure System
Developers of complex systems have to address concerns such as security, availability of services, and timeliness that often are non-orthogonal to traditional design structures, t...
Geri Georg, Indrakshi Ray, Robert B. France