Sciweavers

400 search results - page 17 / 80
» RFID Security: Tradeoffs between Security and Efficiency
Sort
View
ACSAC
2002
IEEE
15 years 3 months ago
Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision
Designers are often faced with difficult tradeoffs between easing the user's burden by making security decisions for them and offering features that ensure that users can mak...
Mary Ellen Zurko, Charlie Kaufman, Katherine Spanb...
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
15 years 10 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...
ICNP
2005
IEEE
15 years 3 months ago
A Family of Collusion Resistant Protocols for Instantiating Security
In this paper, we focus on the problem of identifying a family of collusion resistant protocols that demonstrate a tradeoff between the number of secrets that users maintain and t...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar
DAGSTUHL
2007
14 years 11 months ago
Civitas: A Secure Remote Voting System
Civitas is the first implementation of a coercion-resistant, universally verifiable, remote voting scheme. This paper describes the design of Civitas, details the cryptographic ...
Michael E. Clarkson, Stephen Chong, Andrew C. Myer...
ESORICS
2006
Springer
15 years 1 months ago
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, ...
Milan Fort, Felix C. Freiling, Lucia Draque Penso,...