Sciweavers

5665 search results - page 316 / 1133
» Introduction to Computer Security
Sort
View
ICCSA
2004
Springer
15 years 6 months ago
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme
Abstract. Recently, Shen et al. proposed an improvement on YangShieh’s timestamp-based password authentication scheme using smart cards. Then they claimed that their scheme canno...
Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo
105
Voted
IPTPS
2004
Springer
15 years 6 months ago
Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks
We propose a new cryptographic technique, Acknowledgment Compression, permitting senders of multicast data to verify that all interested parties have either received the data or l...
Antonio Nicolosi, David Mazières
106
Voted
SOFSEM
1998
Springer
15 years 4 months ago
Security of Electronic Money
Abstract. The realisation of electronic commerce process is very difficult without appropriate system for electronic payment. Of course it is possible to use some of the convention...
Petr Hanácek
ACSC
2006
IEEE
15 years 4 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing t...
Colin J. Fidge, Tim McComb
COLCOM
2008
IEEE
15 years 2 months ago
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers i...
Tuan Phan, Danfeng (Daphne) Yao