Sciweavers

2024 search results - page 24 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
CODES
2003
IEEE
15 years 7 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang
PET
2010
Springer
15 years 5 months ago
Drac: An Architecture for Anonymous Low-Volume Communications
We present Drac, a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary. The...
George Danezis, Claudia Díaz, Carmela Tronc...
PETRA
2010
ACM
14 years 11 months ago
The security and privacy implications of using social networks to deliver healthcare
Healthcare technologies have tended to focus on electronic health records and devices (e.g., devices within the home for patients or handheld devices for nurses and physicians), a...
Carrie Gates, Matt Bishop
ACSAC
2005
IEEE
15 years 7 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
IPTPS
2005
Springer
15 years 7 months ago
Peering Peer-to-Peer Providers
The early peer-to-peer applications eschewed commercial arrangements and instead established a grass-roots model in which the collection of end-users provided their own distribute...
Hari Balakrishnan, Scott Shenker, Michael Walfish