Sciweavers

1757 search results - page 47 / 352
» Secure Content Validation
Sort
View
SDMW
2004
Springer
15 years 4 months ago
A Structure Preserving Database Encryption Scheme
Abstract. A new simple and efficient database encryption scheme is presented. The new scheme enables encrypting the entire content of the database without changing its structure. I...
Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehu...
93
Voted
JNW
2008
126views more  JNW 2008»
14 years 11 months ago
Securing Wireless Sensor Networks: Security Architectures
Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limit...
David Boyle, Thomas Newe
ENTCS
2006
137views more  ENTCS 2006»
14 years 11 months ago
Automated Security Protocol Analysis With the AVISPA Tool
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specif...
Luca Viganò
IEEEHPCS
2010
14 years 6 months ago
Framework of Web content filtering for IPv6
IPv6 embraces various good features from the security perspective, but the improvements also bring us some new challenges for web content filtering. This paper presents a new fram...
Yingxu Lai, Qian Ma, Zhen Yang, Jing Liu
ESORICS
2004
Springer
15 years 4 months ago
A Formalization of Anonymity and Onion Routing
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink