Sciweavers

1757 search results - page 113 / 352
» Secure Content Validation
Sort
View
ICICS
2005
Springer
15 years 8 months ago
Secure Multicast Using Proxy Encryption
In a secure multicast communication environment, only valid members belong to the multicast group could decrypt the data. In many previous researches, there is one “group key” ...
Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
ACSAC
2003
IEEE
15 years 8 months ago
S-ARP: a Secure Address Resolution Protocol
Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the Address Resolution P...
Danilo Bruschi, A. Ornaghi, Emilia Rosti
ICSM
2003
IEEE
15 years 8 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...
123
Voted
CCS
2006
ACM
15 years 7 months ago
Defeasible security policy composition for web services
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
ISJGP
2007
146views more  ISJGP 2007»
15 years 3 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...