Sciweavers

5324 search results - page 682 / 1065
» Internet Security Protocols
Sort
View
IEEEARES
2007
IEEE
15 years 11 months ago
On Coercion-Resistant Electronic Elections with Linear Work
Remote electronic voting over the Internet is a promising concept to afford convenience to voters and to increase election turnouts. However, before employing electronic voting sy...
Stefan G. Weber, Roberto Araujo, Johannes Buchmann
ESORICS
2007
Springer
15 years 11 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu
ISPEC
2007
Springer
15 years 11 months ago
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
Abstract. With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital d...
Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
150
Voted
CCS
2005
ACM
15 years 10 months ago
On the cost-ineffectiveness of redundancy in commercial P2P computing
We present a game-theoretic model of the interactions between server and clients in a constrained family of commercial P2P computations (where clients are financially compensated...
Matthew Yurkewych, Brian Neil Levine, Arnold L. Ro...
SWS
2004
ACM
15 years 10 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton