Sciweavers

5722 search results - page 187 / 1145
» Security Function Interactions
Sort
View
93
Voted
SEW
2003
IEEE
15 years 6 months ago
Addressing Software Security and Mitigations in the Life Cycle
Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security...
David P. Gilliam, John D. Powell, Eric Haugh, Matt...
81
Voted
CRYPTO
2000
Springer
139views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
On the Exact Security of Full Domain Hash
Abstract. The Full Domain Hash (FDH) scheme is a RSA-based signature scheme in which the message is hashed onto the full domain of the RSA function. The FDH scheme is provably secu...
Jean-Sébastien Coron
CARDIS
2008
Springer
146views Hardware» more  CARDIS 2008»
15 years 2 months ago
Provably Secure Grouping-Proofs for RFID Tags
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are "simultaneously" scanned by a reader device. Our goal is...
Mike Burmester, Breno de Medeiros, Rossana Motta
134
Voted
CCS
2010
ACM
14 years 10 months ago
Secure encounter-based social networks: requirements, challenges, and designs
In this paper we outline requirements, challenges, and designs for encounter-based mobile social networks, where relationships are based on a temporarily shared location. To illus...
Abedelaziz Mohaisen, Eugene Y. Vasserman, Max Schu...
90
Voted
HAPTICS
2009
IEEE
15 years 7 months ago
Functional analysis of finger contact locations during grasping
In this paper we present a method for studying human selection of fingertip contact point locations during grasping and manipulation. Our aim is to perform a functional analysis,...
Matei T. Ciocarlie, Hao Dang, Jamie Lukos, Marco S...