„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Edit automata: enforcement mechanisms for run-time security policies
-
Static use-based object confinement
-
Rigorous automated network security management
-
An overview of the verification of SET
-
Game strategies in network security
-
Detection of file-based race conditions
-
On the sequence of authorization policy transformations
-
Preface to the special issue on ESORICS 2003
-
Symmetric authentication in a simulatable Dolev–Yao-style cryptographic library
-
Analyzing SLE 88 memory management security using Interacting State Machines
-
Passive-attack analysis for connection-based anonymity systems
-
Techniques for improving the security and manageability of IPsec policy
-
Protocols useful on the Internet from distributed signature schemes
-
A framework for secure execution of software
-
A graph-theoretical model of computer security – From file sharing to social engineering
-
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves
-
A distributed digital rights management model for secure information-distribution systems
-
Outbound authentication for programmable secure coprocessors
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Computational probabilistic noninterference