Sciweavers

1825 search results - page 181 / 365
» Cryptographic Securities Exchanges
Sort
View
IJMI
2007
140views more  IJMI 2007»
15 years 4 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
CCR
2005
95views more  CCR 2005»
15 years 4 months ago
Efficient security for IPv6 multihoming
In this note, we propose a security mechanism for protecting IPv6 networks from possible abuses caused by the malicious usage of a multihoming protocol. In the presented approach,...
Marcelo Bagnulo, Alberto García-Martí...
TON
2008
86views more  TON 2008»
15 years 4 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 3 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
15 years 29 days ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum