Sciweavers

1757 search results - page 142 / 352
» Secure Content Validation
Sort
View
SIGCOMM
1995
ACM
15 years 3 months ago
Authentication Protocols for Personal Communication Systems
Masquerading and eavesdropping are major threats to the security of wireless communications. To provide proper protection for the communication of the wireless link, contents of t...
Hung-Yu Lin, Lein Harn
IADIS
2003
15 years 1 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
EUROCRYPT
2011
Springer
14 years 3 months ago
Concurrent Composition in the Bounded Quantum Storage Model
We define the BQS-UC model, a variant of the UC model, that deals with protocols in the bounded quantum storage model. We present a statistically secure commitment protocol in th...
Dominique Unruh
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 6 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
ESORICS
2009
Springer
16 years 14 days ago
Computationally Sound Analysis of a Probabilistic Contract Signing Protocol
We propose a probabilistic contract signing protocol that achieves balance even in the presence of an adversary that may delay messages sent over secure channels. To show that this...
Mihhail Aizatulin, Henning Schnoor, Thomas Wilke