Sciweavers

2363 search results - page 113 / 473
» How Secure is RFID
Sort
View
121
Voted
ISN
1998
Springer
15 years 8 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
EUROMICRO
2004
IEEE
15 years 8 months ago
Securing Ad hoc Routing Protocols
Ad hoc networks are subject of many recent research efforts. Especially in mobile scenarios, self-organizing networks are of high interest. While the routing aspects of mobile ad ...
Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred...
150
Voted
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 6 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
COMPSAC
2006
IEEE
15 years 11 months ago
A Software Architectural Approach to Security by Design
This paper shows how an architecture description notation that has support for timed events can be used to provide a meta-language for specifying exact communication semantics. Th...
Arnab Ray, Rance Cleaveland
ESORICS
2012
Springer
13 years 7 months ago
Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing
Tracking information flow in dynamic languages remains an open challenge. It might seem natural to address the challenge by runtime monitoring. However, there are well-known funda...
Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld