Sciweavers

5722 search results - page 173 / 1145
» Security Function Interactions
Sort
View
112
Voted
ACSAC
2006
IEEE
15 years 4 months ago
Detecting Policy Violations through Traffic Analysis
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Jeffrey Horton, Reihaneh Safavi-Naini
83
Voted
IEEESP
2010
99views more  IEEESP 2010»
14 years 11 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
89
Voted
CHI
2010
ACM
15 years 6 months ago
Wearable-object-based interaction for a mobile audio device
In this paper, we explore the possibilities of providing miniaturized audio players with gesture control capabilities that are based on wearable objects. We selected thirteen wear...
KwanMyung Kim, Dongwoo Joo, Kun-Pyo Lee
78
Voted
STOC
2003
ACM
110views Algorithms» more  STOC 2003»
16 years 1 months ago
Non-interactive and reusable non-malleable commitment schemes
We consider non-malleable (NM) and universally composable (UC) commitment schemes in the common reference string (CRS) model. We show how to construct non-interactive NM commitmen...
Ivan Damgård, Jens Groth
131
Voted
SPC
2005
Springer
15 years 6 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...