Sciweavers

2904 search results - page 203 / 581
» Internet Infrastructure Security
Sort
View
102
Voted
ACSAC
1999
IEEE
15 years 8 months ago
Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services
Public administrations show a strong interest in digital signature technology as a mean for secure and authenticated document exchange, hoping it will help reducing paper-based tr...
Marco Prandini
155
Voted
CMS
1996
167views Communications» more  CMS 1996»
15 years 5 months ago
Anonymous Mobility Management for Third Generation Mobile Networks
With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well. Following brief surveys of existing approaches to mob...
Simon Hoff, Kai Jakobs, Dogan Kesdogan
121
Voted
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
15 years 10 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee
ANCS
2007
ACM
15 years 8 months ago
Design of a network architecture with inherent data path security
Next-generation Internet architectures require designs with inherent security guarantees. We present a network architecture that uses credentials to audit traffic in the data path...
Tilman Wolf
CASCON
2010
188views Education» more  CASCON 2010»
14 years 11 months ago
First symposium on the Personal Web
The First Symposium on the Personal Web is colocated with CASCON 2010 and is sponsored by IBM CAS Research. This symposium includes key researchers and practitioners in a range of...
Mark H. Chignell, James R. Cordy, Joanna W. Ng, Ye...