Sciweavers

920 search results - page 56 / 184
» Selecting Secure Passwords
Sort
View
FSKD
2005
Springer
102views Fuzzy Logic» more  FSKD 2005»
15 years 11 months ago
A Fuzzy Mixed Projects and Securities Portfolio Selection Model
The business environment is full of uncertainties. Investing in various asset classes may lower the risk of overall portfolio and increase the potential for greater returns. In thi...
Yong Fang, K. K. Lai, Shouyang Wang
FGCS
2000
104views more  FGCS 2000»
15 years 5 months ago
Protecting secret keys with personal entropy
Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
CORR
2006
Springer
103views Education» more  CORR 2006»
15 years 5 months ago
Expressing Security Properties Using Selective Interleaving Functions
McLean's notion of Selective Interleaving Functions (SIFs) is perhaps the bestknown attempt to construct a framework for expressing various security properties. We examine th...
Joseph Y. Halpern, Sabina Petride
IMCSIT
2010
15 years 3 months ago
Selected Security Aspects of Agent-based Computing
The paper presents selected security aspects related to confidentiality, privacy, trust and authenticity issues of a distributed, agent-based computing. Particular attention has be...
Mariusz R. Matuszek, Piotr Szpryngier
EUROCRYPT
2004
Springer
15 years 9 months ago
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
An extended abstract of this paper appears in C. Cachin and J. Camenisch, editors, Advances in Cryptology-EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 22...
Dan Boneh, Xavier Boyen