Sciweavers

2652 search results - page 22 / 531
» When Information Improves Information Security
Sort
View
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
14 years 10 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum
EGOV
2005
Springer
15 years 3 months ago
When Technology Meets the Mind: A Comparative Study of the Technology Acceptance Model
Abstract. Issues related to technology, including diffusion, acceptance, adoption, and adaptation, have been the focus of research for different disciplines including Information S...
Lucy Dadayan, Enrico Ferro
60
Voted
CN
2006
79views more  CN 2006»
14 years 9 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
15 years 3 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
SOSP
1997
ACM
14 years 11 months ago
A Decentralized Model for Information Flow Control
This paper presents a new model for controlling information flow in systems with mutual distrust and decentralized authority. The model allows users to share information with dis...
Andrew C. Myers, Barbara Liskov