Sciweavers

14824 search results - page 2511 / 2965
» Security - Introduction
Sort
View
FOCS
2008
IEEE
15 years 11 months ago
Leakage-Resilient Cryptography
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
Stefan Dziembowski, Krzysztof Pietrzak
GLOBECOM
2008
IEEE
15 years 11 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
HICSS
2008
IEEE
163views Biometrics» more  HICSS 2008»
15 years 11 months ago
Building a Test Suite for Web Application Scanners
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
15 years 11 months ago
Internet Users' Beliefs about Government Surveillance - The Role of Social Awareness and Internet Literacy
This study focuses on exploring Internet literacy and social awareness as antecedents to Internet users’ attitudes towards government surveillance in the Internet environment. P...
Tamara Dinev
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 11 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
« Prev « First page 2511 / 2965 Last » Next »