Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Doumen, Jeroen M."'
Autor:
Czenko, Marcin, Tran, Ha, Doumen, Jeroen M., Etalle, Sandro, Hartel, Pieter, den Hartog, Jeremy, Mauw, Sjouke, Issarny, Valérie, Cremers, Cas
Publikováno v:
1st Int. Workshop on Security and Trust Management (STM), 113-130
STARTPAGE=113;ENDPAGE=130;TITLE=1st Int. Workshop on Security and Trust Management (STM)
Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005), 113-130
STARTPAGE=113;ENDPAGE=130;TITLE=Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005)
STARTPAGE=113;ENDPAGE=130;TITLE=1st Int. Workshop on Security and Trust Management (STM)
Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005), 113-130
STARTPAGE=113;ENDPAGE=130;TITLE=Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005)
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT). T
Autor:
Cheng, Jieyin, Chong, Cheun Ngen, Doumen, Jeroen M., Etalle, Sandro, Hartel, Pieter H., Nikolaus, Stefan, Sasaki, Ryoichi, Qing, Sihan, Okamoto, Eiji, Yoshiura, Hiroshi
Publikováno v:
Security and Privacy in the Age of Ubiquitous Computing (Proceedings IFIP TC11 20th International Conference on Information Security, SEC 2005, Chiba, Japan, May 30-June 1, 2005), 601-612
STARTPAGE=601;ENDPAGE=612;TITLE=Security and Privacy in the Age of Ubiquitous Computing (Proceedings IFIP TC11 20th International Conference on Information Security, SEC 2005, Chiba, Japan, May 30-June 1, 2005)
Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan, 601-612
STARTPAGE=601;ENDPAGE=612;TITLE=Security and Privacy in the Age of Ubiquitous Computing
Security and Privacy in the Age of Ubiquitous Computing ISBN: 9780387256580
SEC
STARTPAGE=601;ENDPAGE=612;TITLE=Security and Privacy in the Age of Ubiquitous Computing (Proceedings IFIP TC11 20th International Conference on Information Security, SEC 2005, Chiba, Japan, May 30-June 1, 2005)
Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30-June 1, 2005, Chiba, Japan, 601-612
STARTPAGE=601;ENDPAGE=612;TITLE=Security and Privacy in the Age of Ubiquitous Computing
Security and Privacy in the Age of Ubiquitous Computing ISBN: 9780387256580
SEC
StreamTo uses tamper resistant hardware tokens to generate the key stream needed to decrypt encrypted streaming music. The combination of a hardware token and streaming media effectively brings tried and tested PayTV technology to the Internet. We pr
Autor:
Verheul, Erik R., Doumen, Jeroen M., van Tilborg, Henk C.A., Blaum, Mario, Farrell, Patrick G.
Publikováno v:
Information, Coding and Mathematics: Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday, 99-119
STARTPAGE=99;ENDPAGE=119;TITLE=Information, Coding and Mathematics
Information, Coding and Mathematics ISBN: 9781441952899
STARTPAGE=99;ENDPAGE=119;TITLE=Information, Coding and Mathematics
Information, Coding and Mathematics ISBN: 9781441952899
We introduce new adaptive chosen ciphertext attacks, called Sloppy Alice Attacks, in which a malicious sender or an adaptive eavesdropper Eve has an oracle which allows her to find out whether a sent encrypted message does, or does not, decrypt prope
Publikováno v:
2012 IEEE International Conference on Consumer Electronics (ICCE); 1/ 1/2012, p650-653, 4p
Autor:
Cheng, Jieyin, Chong, Cheun Ngen, Doumen, Jeroen M., Etalle, Sandro, Hartel, Pieter H., Nikolaus, Stefan
Publikováno v:
Security & Privacy in the Age of Ubiquitous Computing; 2005, p601-612, 12p