Sciweavers

515 search results - page 29 / 103
» Measuring Voter-Controlled Privacy
Sort
View
ACSAC
2001
IEEE
15 years 3 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
ACSAC
2003
IEEE
15 years 3 months ago
Scalable and Efficient PKI for Inter-Organizational Communication
We propose an efficient and flexible system for a secure and authentic data exchange in a multiinstitutional environment, where the institutions maintain different databases and p...
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan ...
CCS
2008
ACM
15 years 1 months ago
Using rhythmic nonces for puzzle-based DoS resistance
To protect against replay attacks, many Internet protocols rely on nonces to guarantee freshness. In practice, the server generates these nonces during the initial handshake, but ...
Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni P...
CRITIS
2008
15 years 1 months ago
Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures
The interdependencies between infrastructures may be the cause of serious problems in mission/safety critical systems. In the CRUTIAL3 project the interdependencies between the ele...
Marco Beccuti, Giuliana Franceschinis, Mohamed Ka&...
ESORICS
2010
Springer
15 years 29 days ago
Kamouflage: Loss-Resistant Password Management
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager i...
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan ...