Sciweavers

1186 search results - page 56 / 238
» A New Approach to Secure Logging
Sort
View
88
Voted
ICICS
2005
Springer
15 years 6 months ago
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails
Efficiently protecting the privacy of multi-recipient emails is not as trivial as it seems. The approach proposed by S/MIME is to concatenate all ciphertexts. However, it suffers ...
Wei Wei, Xuhua Ding, Kefei Chen
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 5 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
116
Voted
WETICE
2002
IEEE
15 years 5 months ago
On Communication Security in Wireless Ad-Hoc Sensor Networks
Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for the wireless technology. Key attributes of these new t...
Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsia...
ACSAC
2000
IEEE
15 years 5 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
AH
2008
Springer
15 years 6 months ago
Designing a Personalized Semantic Web Browser
Web browsing is a complex activity and in general, users are not guided during browsing. Our hypothesis is that by using Semantic Web technologies and personalization methods, brow...
Melike Sah, Wendy Hall, David De Roure