Sciweavers

2904 search results - page 154 / 581
» Internet Infrastructure Security
Sort
View
127
Voted
SOUPS
2005
ACM
15 years 9 months ago
Two experiences designing for effective security
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decision...
Rogério de Paula, Xianghua Ding, Paul Douri...
115
Voted
IAJIT
2010
96views more  IAJIT 2010»
15 years 2 months ago
DDoS Incidents and their Impact: A Review
: The phenomenal growth and success of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defence are operated. No...
Monika Sachdeva, Gurvinder Singh, Krishan Kumar, K...
130
Voted
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 4 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
135
Voted
SOUPS
2009
ACM
15 years 10 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
134
Voted
EGC
2005
Springer
15 years 9 months ago
Security Architecture for Open Collaborative Environment
Abstract. The paper presents proposed Security Architecture for Open Collaborative Environment (OCE) being developed in the framework of the Collaboratory.nl (CNL) project with the...
Yuri Demchenko, Leon Gommans, Cees de Laat, Bas va...