Sciweavers

12478 search results - page 271 / 2496
» Secure Interaction Design
Sort
View
CHI
2009
ACM
15 years 11 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
DANCE
2002
IEEE
15 years 9 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
CIA
2001
Springer
15 years 9 months ago
Cryptographic Protocols for Secure Second-Price Auctions
In recent years auctions have become more and more important in the field of multiagent systems as useful mechanisms for resource allocation, task assignment and last but not leas...
Felix Brandt
ECSA
2008
Springer
15 years 6 months ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...
FMOODS
2006
15 years 6 months ago
Security Issues in Service Composition
Abstract. We use a distributed, enriched -calculus for describing networks of services. Both services and their clients can protect themselves, by imposing security constraints on ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...