Sciweavers

3482 search results - page 188 / 697
» Designing for security
Sort
View
143
Voted
ECWEB
2003
Springer
93views ECommerce» more  ECWEB 2003»
15 years 10 months ago
A Secure Electronic Payment Scheme for Charity Donations
Although many charities have a web presence, almost all of them have been designed to accept credit cards as the only means for making donations. The anonymity requirements of many...
Mansour A. Al-Meaither, Chris J. Mitchell
CRYPTO
2000
Springer
184views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a dispute, the identity of a signature’s originator ca...
Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene ...
ESCIENCE
2006
IEEE
15 years 8 months ago
A Collaborative Virtual Computer Security Lab
The necessity of a lab course on computer security arises from the students' need to complement course work by hands-on experience. In order to meet the distance teaching dem...
Jörg Keller, Ralf Naues
122
Voted
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
15 years 4 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
DIM
2008
ACM
15 years 6 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel