Sciweavers

546 search results - page 34 / 110
» On the Power of Secure Two-Party Computation
Sort
View
TPDS
2008
125views more  TPDS 2008»
14 years 9 months ago
Computation-Efficient Multicast Key Distribution
Efficient key distribution is an important problem for secure group communications. The communication and storage complexity of multicast key distribution problem has been studied ...
Lihao Xu, Cheng Huang
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
15 years 2 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
CSREASAM
2006
14 years 11 months ago
A Visual Environment for Characterization of State Changes in Computer Systems
: Traditional state modeling techniques have several limitations. One of these is the reduced ability to model a large number of variables simultaneously. Another limitation is tha...
Gregory Vert, Sergiu M. Dascalu, Frederick C. Harr...
WOA
2010
14 years 7 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
WOWMOM
2009
ACM
142views Multimedia» more  WOWMOM 2009»
15 years 4 months ago
Securing wireless communication with implanted medical devices using reciprocal carrier-phase quantization
Securing wireless communication with resourceconstrained implanted medical devices is considered. A method for refreshing symmetric encryption keys by reciprocal quantization of t...
Gill R. Tsouri