Sciweavers

26 search results - page 2 / 6
» ijisec 2006
Sort
View
IJISEC
2007
61views more  IJISEC 2007»
14 years 11 months ago
COVERAGE: detecting and reacting to worm epidemics using cooperation and validation
Kostas G. Anagnostakis, Michael B. Greenwald, Soti...
IJISEC
2010
85views more  IJISEC 2010»
14 years 10 months ago
EXAM: a comprehensive environment for the analysis of access control policies
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, ...
IJISEC
2007
58views more  IJISEC 2007»
14 years 11 months ago
Audit-based compliance control
J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, ...
IJISEC
2002
58views more  IJISEC 2002»
14 years 11 months ago
A complete characterization of a family of key exchange protocols
Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a one-bit secret key which is informationtheoretically secure from t...
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
IJISEC
2007
88views more  IJISEC 2007»
14 years 11 months ago
Secure group key establishment revisited
Abstract. We examine the popular proof models for group key establishment of Bresson et al. [BCPQ01,BCP01] and point out missing security properties addressing malicious protocol p...
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, ...