Sciweavers

507 search results - page 45 / 102
» The XTR Public Key System
Sort
View
STORAGESS
2005
ACM
15 years 6 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
IFIP
2010
Springer
14 years 7 months ago
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems
Abstract. This paper extends existing models for collaborative systems. We investigate how much damage can be done by insiders alone, without collusion with an outside adversary. I...
Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, ...
CORR
2010
Springer
137views Education» more  CORR 2010»
14 years 10 months ago
Comparing Repository Types - Challenges and barriers for subject-based repositories, research repositories, national repository
After two decades of repository development, some conclusions may be drawn as to which type of repository and what kind of service best supports digital scholarly communication, a...
Chris Armbruster, Laurent Romary
123
Voted
BMCBI
2010
125views more  BMCBI 2010»
14 years 7 months ago
ProbFAST: Probabilistic Functional Analysis System Tool
Background: The post-genomic era has brought new challenges regarding the understanding of the organization and function of the human genome. Many of these challenges are centered...
Israel T. da Silva, Ricardo Z. N. Vêncio, Th...
USENIX
2008
15 years 3 months ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig