Sciweavers

2575 search results - page 26 / 515
» Providing security with insecure systems
Sort
View
PLDI
2006
ACM
15 years 5 months ago
Combining type-based analysis and model checking for finding counterexamples against non-interference
Type systems for secure information flow are useful for efficiently checking that programs have secure information flow. They are, however, conservative, so that they often rej...
Hiroshi Unno, Naoki Kobayashi, Akinori Yonezawa
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
15 years 5 months ago
Programming Education in the Era of the Internet: A Paradigm Shift
Over the last several years, the Computer Science (CS) community has put a great deal of effort in to the area of security research, and have made great advances. Counterintuitive...
Scott Harrison, Nadine Hanebutte, Jim Alves-Foss
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
15 years 5 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
15 years 5 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
TIT
2011
112views more  TIT 2011»
14 years 6 months ago
On the Secure Degrees of Freedom of Relaying With Half-Duplex Feedback
—Secure communication protocols over a single-relay system in the presence of a multiple-antenna eavesdropper are investigated. When there is no direct link between the source an...
Thanh Tùng Kim, H. Vincent Poor