Sciweavers

2363 search results - page 69 / 473
» How Secure is RFID
Sort
View
ISSA
2008
15 years 5 months ago
Spam Over Internet Telephony and How to Deal with it
In our modern society telephony has developed to an omnipresent service. People are available at anytime and anywhere. Furthermore the Internet has emerged to an important communi...
Rachid El Khayari, Nicolai Kuntze, Andreas U. Schm...
CRYPTO
2006
Springer
109views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
There are several candidate semantically secure encryption schemes, yet in many applications non-malleability of encryptions is crucial. We show how to transform any semantically s...
Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
CSREASAM
2003
15 years 5 months ago
Securing FIPA Agent Communication
— The agent paradigm has been the subject of much research during the last decade. Recently, security of multiagent systems has gained increased attention. In this paper we consi...
Niklas Borselius, Chris J. Mitchell
PST
2004
15 years 5 months ago
Secure Public Instant Messaging
We provide a survey on security features and threats to existing Instant Messaging (IM) networks and discuss how currently available systems fail to provide adequate security in l...
Mohammad Mannan, Paul C. van Oorschot
ACSW
2006
15 years 5 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt