Sciweavers

1154 search results - page 70 / 231
» Making Self-organizing Systems Secure
Sort
View
WWW
2004
ACM
16 years 2 months ago
Integrating elliptic curve cryptography into the web's security infrastructure
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make...
Vipul Gupta, Douglas Stebila, Sheueling Chang Shan...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 7 months ago
Insuring Big Losses Due to Security Breaches through Insurance: A Business Model
Security breaches deter e-commerce activities. Organizations spend millions of dollars on security appliances to make online transactions more secure. Nonetheless, a new virus or ...
Arunabha Mukhopadhyay, Samir Chatterjee, Rahul Roy...
SENSYS
2005
ACM
15 years 7 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
HASKELL
2008
ACM
15 years 2 months ago
A library for light-weight information-flow security in haskell
Protecting confidentiality of data has become increasingly important for computing systems. Information-flow techniques have been developed over the years to achieve that purpos...
Alejandro Russo, Koen Claessen, John Hughes
WWW
2008
ACM
16 years 2 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida