Sciweavers

1757 search results - page 45 / 352
» Secure Content Validation
Sort
View
ICICS
2003
Springer
15 years 8 months ago
Security Remarks on a Group Signature Scheme with Member Deletion
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable fashion. In case of a dispute, however, a des...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
OTM
2007
Springer
15 years 9 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
ACMSE
2004
ACM
15 years 8 months ago
Security for fixed sensor networks
Sensor networks consist of resource-constrained sensors operating in a variety of environments. Given the severe constraints on these sensors, it is a particularly challenging pro...
Ning Hu, Randy K. Smith, Phillip G. Bradford
ICCSA
2005
Springer
15 years 8 months ago
Security Flaws in Several Group Signatures Proposed by Popescu
In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8–11], and claimed his schemes are secure. However, this paper dem...
Guilin Wang, Sihan Qing
CAISE
2006
Springer
15 years 5 months ago
An attempt to combine UML and formal methods to model airport security
The EDEMOI project aims to model standards that regulate airport security. It involves the production of a UML model, to support the validation activity, and a formal model for ver...
Yves Ledru, Régine Laleau, Michel Lemoine, ...