Sciweavers

631 search results - page 56 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
GEOINFO
2004
15 years 3 months ago
Towards a Web Service for Geographic and Multidimensional Processing
: A lot of research has been developed for integrating the analysis functionality that is available in both analytic and geographic processing systems. The main goal is to provide ...
Joel da Silva, Valéria Cesário Times...
PERCOM
2005
ACM
16 years 1 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 7 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
EGOV
2005
Springer
15 years 7 months ago
An Infrastructural Approach to Secure Interoperability of Electronic IDs: The Bridging Backbone
In this paper we propose a solution to secure interoperability between electronic ID management infrastructures enabling the provision of cross-border eServices to mobile citizens....
Franco Arcieri, Andrea Dimitri, Fabio Fioravanti, ...
126
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 1 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya