Sciweavers

58 search results - page 6 / 12
» An Introduction to Standards related to Information Security
Sort
View
111
Voted
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 3 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
CCS
2008
ACM
15 years 1 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
CHI
2010
ACM
15 years 6 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
IEEESCC
2007
IEEE
15 years 6 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
199
Voted
PET
2012
Springer
13 years 2 months ago
PRISM - Privacy-Preserving Search in MapReduce
We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves pr...
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva,...