Sciweavers

1612 search results - page 219 / 323
» About models of security protocols
Sort
View
POPL
2000
ACM
15 years 2 months ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
CIKM
2008
Springer
15 years 5 hour ago
Towards privacy-preserving integration of distributed heterogeneous data
More and more applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. ...
Pawel Jurczyk, Li Xiong
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 4 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
CCS
2009
ACM
15 years 4 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
PERCOM
2007
ACM
15 years 9 months ago
A User Interaction Model for NFC Enabled Applications
Near field communication (NFC) is a short-range wireless protocol that allows users to connect devices and access content and services by simply holding enabled devices near each ...
Yaw Anokwa, Gaetano Borriello, Trevor Pering, Roy ...