Sciweavers

2237 search results - page 73 / 448
» On the Security of Random Sources
Sort
View
143
Voted
CAISE
2000
Springer
15 years 9 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
141
Voted
CSFW
1999
IEEE
15 years 9 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
ICDCS
2005
IEEE
15 years 10 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 8 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
ECML
2007
Springer
15 years 11 months ago
Source Separation with Gaussian Process Models
In this paper we address a method of source separation in the case where sources have certain temporal structures. The key contribution in this paper is to incorporate Gaussian pro...
Sunho Park, Seungjin Choi