Sciweavers

1757 search results - page 79 / 352
» Secure Content Validation
Sort
View
PKC
2007
Springer
111views Cryptology» more  PKC 2007»
15 years 9 months ago
Optimistic Fair Exchange in a Multi-user Setting
: This paper addresses the security of optimistic fair exchange in a multi-user setting. While the security of public key encryption and public key signature schemes in a single-us...
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
EGOV
2005
Springer
15 years 8 months ago
An Infrastructural Approach to Secure Interoperability of Electronic IDs: The Bridging Backbone
In this paper we propose a solution to secure interoperability between electronic ID management infrastructures enabling the provision of cross-border eServices to mobile citizens....
Franco Arcieri, Andrea Dimitri, Fabio Fioravanti, ...
111
Voted
ICWL
2009
Springer
15 years 9 months ago
Social Reference Model for Adaptive Web Learning
In this paper, we describe the design steps of extending LAOS, a five-layer framework for generic adaptive web learning authoring, by adding a social layer to capture (and adapt) i...
Fawaz Ghali, Alexandra I. Cristea
CCS
2006
ACM
15 years 7 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
SAC
2005
ACM
15 years 8 months ago
SELS: a secure e-mail list service
Exchange of private information content among a large number of users via E-mail List Services is becoming increasingly common. In this paper we address security requirements in t...
Himanshu Khurana, Adam J. Slagell, Rafael Bonilla