Sciweavers

1186 search results - page 69 / 238
» A New Approach to Secure Logging
Sort
View
ICALP
2010
Springer
15 years 2 months ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
ATAL
2009
Springer
15 years 7 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 7 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
SOUPS
2009
ACM
15 years 7 months ago
Treat 'em like other devices: user authentication of multiple personal RFID tags
User-to-tag authentication can prevent a variety of potential attacks on personal RFID tags. In this poster, a new RFID authentication scheme is presented that allows a user to co...
Nitesh Saxena, Md. Borhan Uddin, Jonathan Voris
93
Voted
EUPROJECTS
2005
Springer
15 years 6 months ago
Patients and EHRs Tele Home Monitoring Reference Scenario
This scenario focuses on patients as users of Electronic Health Records (EHR) relevant information. The concrete field of applications is telemonitoring at home, a field where many...
Michael Pieper, Karl Stroetmann