Sciweavers

1106 search results - page 107 / 222
» Automated Design of Security Protocols
Sort
View
IJISEC
2006
108views more  IJISEC 2006»
15 years 4 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
JCM
2010
98views more  JCM 2010»
15 years 2 months ago
High Speed Data Routing in Vehicular Sensor Networks
—In this paper, we show through a simple secure symmetric key based protocol design and experiments the feasibility of secure data collection in a vehicular sensor networks. This...
Harry Gao, Seth Utecht, Gregory Patrick, George Hs...
ECSQARU
2007
Springer
15 years 10 months ago
PADUA Protocol: Strategies and Tactics
In this paper we describe an approach to classifying objects in a domain where classifications are uncertain using a novel combination of argumentation and data mining. Classific...
Maya Wardeh, Trevor J. M. Bench-Capon, Frans Coene...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 10 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
STORAGESS
2005
ACM
15 years 10 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo