Sciweavers

1186 search results - page 71 / 238
» A New Approach to Secure Logging
Sort
View
112
Voted
DLOG
2010
14 years 10 months ago
An Algebraic Approach to Dynamic Epistemic Logic
Dynamic epistemic logic plays a key role in reasoning about multi-agent systems. Past approaches to dynamic epistemic logic have typically been focused on actions whose primary pur...
Prakash Panangaden, Caitlin Phillips, Doina Precup...
121
Voted
OTM
2004
Springer
15 years 6 months ago
Application of Grid Security to Personal Distributed Environments
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile...
Allan Tomlinson, Scarlet Schwiderski-Grosche
ASPLOS
2008
ACM
15 years 2 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
CRYPTO
1997
Springer
156views Cryptology» more  CRYPTO 1997»
15 years 4 months ago
Fast and Secure Hashing Based on Codes
This paper considers hash functions based on block ciphers. It presents a new attack on the compression function of the 128-bit hash function MDC-4 using DES with a complexity far ...
Lars R. Knudsen, Bart Preneel
143
Voted
WIS
2004
15 years 1 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur