Sciweavers

674 search results - page 56 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
CCS
2009
ACM
15 years 4 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
ACISP
2005
Springer
15 years 3 months ago
Tunable Balancing of RSA
We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanc...
Steven D. Galbraith, Chris Heneghan, James F. McKe...
IAT
2006
IEEE
15 years 3 months ago
An Adaptive Multi-agent Organization Model Based on Dynamic Role Allocation
Organizations involving multiple agents require adaptation mechanisms to guarantee robustness, especially in critical domains. This paper presents an organizational template to ai...
Mark Hoogendoorn, Jan Treur
CCS
2010
ACM
14 years 10 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
WSC
2008
15 years 2 days ago
Using simulation in the implementation of an Outpatient Procedure Center
Creation of an Outpatient Procedure Center (OPC) is a complicated endeavor, requiring a detailed understanding of the resources available and the procedures to be performed. Misca...
Todd R. Huschka, Brian T. Denton, Bradly J. Narr, ...