Sciweavers

6555 search results - page 1076 / 1311
» Secure attribute-based systems
Sort
View
115
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 3 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
137
Voted
IEEESP
2008
136views more  IEEESP 2008»
15 years 3 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
133
Voted
CORR
2006
Springer
182views Education» more  CORR 2006»
15 years 3 months ago
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Joan-Josep Climent, E. Gorla, J. Rosenthal
114
Voted
CORR
2006
Springer
100views Education» more  CORR 2006»
15 years 3 months ago
Authorised Translations of Electronic Documents
A concept is proposed to extend authorised translations of documents to electronically signed, digital documents. Central element of the solution is an electronic seal, embodied a...
Jan Piechalski, Andreas U. Schmidt
124
Voted
ENTCS
2006
103views more  ENTCS 2006»
15 years 3 months ago
Static Equivalence is Harder than Knowledge
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
Johannes Borgström
« Prev « First page 1076 / 1311 Last » Next »