Sciweavers

3811 search results - page 55 / 763
» The Safe-Tcl Security Model
Sort
View
JIPS
2010
110views more  JIPS 2010»
14 years 6 months ago
A License Audit Model for Secure DRM Systems in IP-based Environments
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by c...
Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
The Collision Security of Tandem-DM in the Ideal Cipher Model
We prove that Tandem-DM, one of the two “classical” schemes for turning a blockcipher of 2n-bit key into a double block length hash function, has birthday-type collision resist...
Jooyoung Lee, Martijn Stam, John P. Steinberger
ISSRE
2010
IEEE
14 years 10 months ago
Security Trend Analysis with CVE Topic Models
—We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic models on their description texts to find prevalent vulnerability typ...
Stephan Neuhaus, Thomas Zimmermann
IJACTAICIT
2010
176views more  IJACTAICIT 2010»
14 years 9 months ago
A Secured Web Services Based E-Commerce Model for SMME Using Digital Identity
This paper deals with redesigning the existing e-commerce architecture that has provided a platform for the large companies to sell their products so that it can provide a place o...
Ashwin B. K., Kumaran K., Madhu Vishwanatham V., M...
TDSC
2011
14 years 6 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...