Sciweavers

1605 search results - page 38 / 321
» E-commerce Security Issues
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
SIGKDD
2008
138views more  SIGKDD 2008»
14 years 9 months ago
PinKDD'08: privacy, security, and trust in KDD post workshop report
This report summarizes the events of the 2nd International Workshop on Privacy, Security, and Trust in KDD, at the 14th ACM SIGKDD International Conference on Knowledge Discovery ...
Francesco Bonchi, Elena Ferrari, Wei Jiang, Bradle...
IJNSEC
2007
128views more  IJNSEC 2007»
14 years 9 months ago
A Comprehensive Secure VoIP Solution
VoIP represents the future of digital voice communications and many carriers are preparing for the VoIP revolution. However, a number of outstanding issues need to be settled. The...
Ashraf D. Elbayoumy, Simon J. Shepherd
SPW
2005
Springer
15 years 3 months ago
Implementing a Multi-hat PDA
We describe our work in progress aimed at implementing a multi-hat PDA. Our current prototype is based on SELinux and KDE and accepts a proximity token, in the form of a Bluetooth ...
Matthew Johnson
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
15 years 10 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...