Sciweavers

4820 search results - page 208 / 964
» Implementing Signatures for C
Sort
View
WPES
2004
ACM
15 years 8 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
ACSC
2003
IEEE
15 years 8 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
APSEC
2003
IEEE
15 years 8 months ago
Ensuring Compatible Interactions within Component-based Software Systems
The interface definition of a component in a distributed system forms the contract between the component itself and its neighbouring components regarding the use of its services....
Jun Han, Ksze Kae Ker
ACSAC
2000
IEEE
15 years 7 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
130
Voted
WISE
2000
Springer
15 years 7 months ago
Logging and Signing Document-Transfers on the WWW-A Trusted Third Party Gateway
In this work we discuss a service that aims to make quoting of online documents, „web contents“ easy and provable. For that reason we report the conception of a gateway that w...
Andreas Heuer 0002, Frank Losemann, Christoph Mein...