Sciweavers

3811 search results - page 23 / 763
» The Safe-Tcl Security Model
Sort
View
IWNAS
2008
IEEE
15 years 6 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
IEEEARES
2010
IEEE
15 years 4 months ago
Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats
Almost every company needs to process invoices to either claim money from their customers or to pay for products or services. Although companies are allowed to electronically proce...
Michael Netter, Eduardo B. Fernández, G&uum...
EUROPKI
2007
Springer
15 years 6 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
15 years 6 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
CCS
2007
ACM
15 years 6 months ago
Security under key-dependent inputs
In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by B...
Shai Halevi, Hugo Krawczyk