Sciweavers

1186 search results - page 114 / 238
» A New Approach to Secure Logging
Sort
View
95
Voted
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 6 months ago
Electronic Voting: Algorithmic and Implementation Issues
Electronic Transactions over the Internet, particularly using the World Wide Web have become an integral part of economic life. Recently also the public sector has started to use ...
Robert Kofler, Robert Krimmer, Alexander Prosser
ISW
1997
Springer
15 years 4 months ago
Signcryption and Its Applications in Efficient Public Key Solutions
Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step,...
Yuliang Zheng
126
Voted
IJNSEC
2008
152views more  IJNSEC 2008»
15 years 20 days ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
117
Voted
SP
2002
IEEE
170views Security Privacy» more  SP 2002»
15 years 9 days ago
Alert Correlation in a Cooperative Intrusion Detection Framework
This paper presents the work we have done within the MIRADOR project to design CRIM, a cooperative module for intrusion detection systems (IDS). This module implements functions t...
Frédéric Cuppens, Alexandre Mi&egrav...
114
Voted
JCS
2011
126views more  JCS 2011»
14 years 7 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe