Sciweavers

1166 search results - page 110 / 234
» Adaptively Secure Broadcast
Sort
View
99
Voted
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
15 years 7 months ago
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 4 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
CCS
2010
ACM
15 years 27 days ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster
IACR
2011
90views more  IACR 2011»
14 years 10 days ago
On the Security of the Winternitz One-Time Signature Scheme
Abstract. We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudo random ...
Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andre...
STORAGESS
2005
ACM
15 years 6 months ago
Hydra: a platform for survivable and secure data storage systems
This paper introduces Hydra, a platform that we are developing for highly survivable and secure data storage systems that distribute information over networks and adapt timely to ...
Lihao Xu