Sciweavers

1587 search results - page 150 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
CCS
2008
ACM
15 years 7 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
EUROSSC
2008
Springer
15 years 6 months ago
Exploring the Design of Pay-Per-Use Objects in the Construction Domain
Equipment used in the construction domain is often hired in order to reduce cost and maintenance overhead. The cost of hire is dependent on the time period involved and does not ta...
Daniel Fitton, Vasughi Sundramoorthy, Gerd Kortuem...
ACSAC
2009
IEEE
15 years 12 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
ASIACRYPT
2009
Springer
15 years 11 months ago
Group Encryption: Non-interactive Realization in the Standard Model
Group encryption (GE) schemes, introduced at Asiacrypt’07, are an encryption analogue of group signatures with a number of interesting applications. They allow a sender to encryp...
Julien Cathalo, Benoît Libert, Moti Yung
ISI
2007
Springer
15 years 11 months ago
SIGHTS: A Software System for Finding Coalitions and Leaders in a Social Network
Abstract—We present an extended version of a software system SIGHTS1 (Statistical Identification of Groups Hidden in Time and Space), which can be used for the discovery, analys...
Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovy...