Sciweavers

2904 search results - page 207 / 581
» Internet Infrastructure Security
Sort
View
113
Voted
ICICS
1997
Springer
15 years 8 months ago
An implementable scheme for secure delegation of computing and data
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, d...
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti...
ACSAC
2006
IEEE
15 years 10 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna
EUROCRYPT
1997
Springer
15 years 8 months ago
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals
We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when no...
Eric R. Verheul, Henk C. A. van Tilborg
110
Voted
DGO
2004
78views Education» more  DGO 2004»
15 years 5 months ago
Scalable and Secure Data Collection: Fault Tolerance Considerations
Data collection, or uploading, is an inherent part of numerous digital government applications. In this poster we present our recent research directions in the development of Bist...
William C. Cheng, Leslie Cheung, Cheng-Fu Chou, Le...
129
Voted
CSREASAM
2006
15 years 5 months ago
Flexible Cryptographic Component Design for Secure Web Applications
- Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations...
Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo...