Sciweavers

5665 search results - page 281 / 1133
» Introduction to Computer Security
Sort
View
131
Voted
ISCIS
2005
Springer
15 years 6 months ago
A Secure Communication Framework for Mobile Agents
Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
Suat Ugurlu, Nadia Erdogan
87
Voted
FC
2004
Springer
78views Cryptology» more  FC 2004»
15 years 6 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
CORR
2010
Springer
117views Education» more  CORR 2010»
15 years 19 days ago
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
Mohsen Toorani
118
Voted
ENTCS
2007
199views more  ENTCS 2007»
15 years 14 days ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
84
Voted
JOC
2002
114views more  JOC 2002»
15 years 6 days ago
Improving the Exact Security of Digital Signature Schemes
We put forward a new method of constructing Fiat-Shamir-like signature schemes that yields better "exact security" than the original Fiat-Shamir method. (We also point o...
Silvio Micali, Leonid Reyzin