Sciweavers

5722 search results - page 178 / 1145
» Security Function Interactions
Sort
View
AC
1998
Springer
15 years 5 months ago
The Search for the Holy Grail in Quantum Cryptography
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
Louis Salvail
98
Voted
JSAC
2007
78views more  JSAC 2007»
15 years 18 days ago
VMesh: Distributed Segment Storage for Peer-to-Peer Interactive Video Streaming
Abstract—Provisioning random access functions in peer-topeer on-demand video streaming is challenging, due to not only the asynchronous user interactivity but also the unpredicta...
Wai-Pun Ken Yiu, Xing Jin, Shueng-Han Gary Chan
DSRT
2008
IEEE
15 years 7 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
100
Voted
WISA
2007
Springer
15 years 6 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
89
Voted
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
15 years 6 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...