Sciweavers

5665 search results - page 320 / 1133
» Introduction to Computer Security
Sort
View
164
Voted
WS
2003
ACM
15 years 5 months ago
Wireless LAN location-sensing for security applications
This paper considers the problem of using wireless LAN locationsensing for security applications. Recently, Bayesian methods have been successfully used to determine location from...
Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wall...
EUROCRYPT
2004
Springer
15 years 4 months ago
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
An extended abstract of this paper appears in C. Cachin and J. Camenisch, editors, Advances in Cryptology-EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 22...
Dan Boneh, Xavier Boyen
64
Voted
USS
2008
15 years 3 months ago
Security Benchmarking using Partial Verification
Implementation-level vulnerabilities are a persistent threat to the security of computing systems. We propose using the results of partially-successful verification attempts to pl...
Thomas E. Hart, Marsha Chechik, David Lie
105
Voted
IMCS
2007
144views more  IMCS 2007»
15 years 16 days ago
On the imbalance of the security problem space and its expected consequences
Purpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the ...
Konstantin Beznosov, Olga Beznosova
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 4 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore