Sciweavers

637 search results - page 58 / 128
» The Case for Abstracting Security Policies
Sort
View
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 5 months ago
Quantifying Security in Hybrid Cellular Networks
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
Markus Jakobsson, Liu Yang
WDAG
2000
Springer
125views Algorithms» more  WDAG 2000»
15 years 3 months ago
Establishing Business Rules for Inter-Enterprise Electronic Commerce
Conventional mechanisms for electronic commerce provide strong means for securing transfer of funds, and for ensuring such things as authenticity and non-repudiation. But they gene...
Victoria Ungureanu, Naftaly H. Minsky
FAST
2004
15 years 1 months ago
MEMS-based Storage Devices and Standard Disk Interfaces: A Square Peg in a Round Hole?
MEMS-based storage devices (MEMStores) are significantly different from both disk drives and semiconductor memories. The differences motivate the queswhether they need new abstrac...
Steven W. Schlosser, Gregory R. Ganger
CASES
2005
ACM
15 years 1 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
FSEN
2007
Springer
15 years 6 months ago
Is Your Security Protocol on Time ?
Abstract. In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a s...
Gizela Jakubowska, Wojciech Penczek