Sciweavers

2386 search results - page 224 / 478
» Database Security 2000
Sort
View
110
Voted
INFOCOM
2000
IEEE
15 years 2 months ago
Windowed Certificate Revocation
Abstract--The advent of electronic commerce and personal communications on the Internet heightens concerns over the lack of privacy and security. Network services providing a wide ...
Patrick Drew McDaniel, Sugih Jamin
67
Voted
CCR
2000
93views more  CCR 2000»
14 years 10 months ago
On the validity of digital signatures
An important feature of digital signatures is to serve as nonrepudiation evidence. To be eligible as non-repudiation evidence, a digital signature on an electronic document should...
Jianying Zhou, Robert H. Deng
CCR
2000
78views more  CCR 2000»
14 years 10 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas
WWW
2002
ACM
15 years 11 months ago
Abstracting application-level web security
ing Application-Level Web Security David Scott Laboratory For Communications Engineering Engineering Department Trumpington Street Cambridge CB2 1PZ djs55@eng.cam.ac.uk Richard Sha...
David Scott, Richard Sharp
94
Voted
MSR
2010
ACM
15 years 27 days ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie