Sciweavers

6164 search results - page 1004 / 1233
» Teaching Computer Security
Sort
View
124
Voted
CSUR
2010
373views more  CSUR 2010»
15 years 1 months ago
A survey of confidential data storage and deletion methods
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic stor...
Sarah M. Diesburg, An-I Andy Wang
153
Voted
IJNSEC
2011
78views more  IJNSEC 2011»
14 years 11 months ago
Multi-authority Electronic Voting Scheme Based on Elliptic Curves
In this paper, a new multi authority electronic voting scheme based on elliptic curves is proposed. According to the proposed scheme, each voter casts the vote as a point on the e...
Chinniah Porkodi, Ramalingam Arumuganathan, Krishn...
JCS
2011
72views more  JCS 2011»
14 years 11 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
TDSC
2010
168views more  TDSC 2010»
14 years 11 months ago
An Advanced Hybrid Peer-to-Peer Botnet
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...
Ping Wang, Sherri Sparks, Cliff Changchun Zou
273
Voted
AMC
2011
14 years 7 months ago
Ruin theory with excess of loss reinsurance and reinstatements
The present paper studies the probability of ruin of an insurer, if excess of loss reinsurance with reinstatements is applied. In the setting of the classical CramerLundberg risk ...
Hansjörg Albrecher, Sandra Haas
« Prev « First page 1004 / 1233 Last » Next »