Sciweavers

10575 search results - page 1935 / 2115
» Programming Languages
Sort
View
70
Voted
IFIP
2005
Springer
15 years 3 months ago
Probable Innocence Revisited
In this paper we propose a formalization of probable innocence, a notion of probabilistic anonymity that is associated to “realistic” protocols such as Crowds. We analyze crit...
Konstantinos Chatzikokolakis, Catuscia Palamidessi
87
Voted
IFIP
2005
Springer
15 years 3 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
IFIP
2005
Springer
15 years 3 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
IFIP
2005
Springer
15 years 3 months ago
Forensic Analysis of Mobile Phone Internal Memory
Mobile phones have become a very important tool for personal communication. It is therefore of great importance that forensic investigators have possibilities to extract evidence ...
Svein Willassen
69
Voted
TGC
2005
Springer
15 years 3 months ago
Mixin Modules for Dynamic Rebinding
Dynamic rebinding is the ability of changing the definitions of names at execution time. While dynamic rebinding is clearly useful in practice, and increasingly needed in modern s...
Davide Ancona, Sonia Fagorzi, Elena Zucca
« Prev « First page 1935 / 2115 Last » Next »