Sciweavers

1564 search results - page 103 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
POLICY
2009
Springer
15 years 4 months ago
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
—There are increasing capabilities and demands for the remote monitoring of homes and their occupants. There are a variety of options for the architecture of such monitoring syst...
Carl A. Gunter
ETFA
2008
IEEE
15 years 4 months ago
A secure agent platform for active RFID
RFID are used to identify products in factory automation applications; Multi agent systems are a possibility to introduce flexibility into production processes. This article intro...
Albert Treytl, Werner Spenger, Bilal Riaz
SAS
2005
Springer
15 years 3 months ago
Secure Information Flow as a Safety Problem
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D’Argenio, and Rezk coined th...
Tachio Terauchi, Alexander Aiken
FC
2003
Springer
133views Cryptology» more  FC 2003»
15 years 3 months ago
Secure Generalized Vickrey Auction Using Homomorphic Encryption
Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a com...
Koutarou Suzuki, Makoto Yokoo
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
15 years 2 months ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel