Sciweavers

2904 search results - page 157 / 581
» Internet Infrastructure Security
Sort
View
CCS
2000
ACM
15 years 7 months ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
ESORICS
2005
Springer
15 years 9 months ago
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Security protocols are critical for protecting modern communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these proto...
Aslan Askarov, Andrei Sabelfeld
TRUSTBUS
2010
Springer
15 years 2 months ago
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution
Abstract. Current challenges on the markets cause companies to interact with one another and strive after becoming members of virtual organizations assuming that in doing so they c...
Christoph Fritsch, Günther Pernul
ISSA
2004
15 years 5 months ago
South African Online Banking: Who Carries The Risk?
Today, Internet fraud occurs more and more frequently, and its devastating effects for organisations, such as banks, as well as their clients constitutes a continuous nightmare fo...
Anna Granova
SOUPS
2006
ACM
15 years 9 months ago
Protecting domestic power-line communications
– In this paper we describe the protection goals and mechanisms in HomePlug AV, a next-generation power-line communications standard. This is a fascinating case-history in securi...
Richard E. Newman, Sherman Gavette, Larry Yonge, R...