Sciweavers

1788 search results - page 24 / 358
» Integrating Security into the Curriculum
Sort
View
JPDC
2006
141views more  JPDC 2006»
14 years 9 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
CE
2007
121views more  CE 2007»
14 years 9 months ago
Transition from traditional to ICT-enhanced learning environments in undergraduate chemistry courses
This paper describes a three-year study conducted among chemistry instructors (professors and teaching assistants) at a post-secondary institution. The goal was to explore the int...
Miri Barak
ESORICS
2008
Springer
14 years 11 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
IDTRUST
2010
ACM
15 years 2 months ago
CardSpace-liberty integration for CardSpace users
Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of inter...
Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J....
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 3 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...