Sciweavers

1190 search results - page 155 / 238
» Secure off-the-record messaging
Sort
View
OOPSLA
2007
Springer
15 years 6 months ago
Living in the comfort zone
A comfort zone is a tested region of a system’s input space within which it has been observed to behave acceptably. To keep systems operating within their comfort zones, we advo...
Martin C. Rinard
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 1 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
115
Voted
CODCRY
2009
Springer
111views Cryptology» more  CODCRY 2009»
15 years 7 months ago
On the Impossibility of Strong Encryption Over
We give two impossibility results regarding strong encryption over an infinite enumerable domain. The first one relates to statistically secure one-time encryption. The second on...
Raphael C.-W. Phan, Serge Vaudenay
GLOBECOM
2008
IEEE
15 years 7 months ago
Trust Credential Distribution in Autonomic Networks
Abstract—Autonomic networks are networks that are selforganized with decentralized control and management. Accurate trust establishment and maintenance is essential for secure an...
Tao Jiang, John S. Baras
92
Voted
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 7 months ago
Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce
Abstract— An important issue in mobile commerce (mcommerce) is to exchange digital data between two distributed parties in an efficient and fair manner. In this paper, a lightwe...
Huafei Zhu, Feng Bao