Search Results
2. Keys under doormats: mandating insecurity by requiring government access to all data and communications
3. Mysterious Checks from Mauborgne to Fabyan
4. The Economics of Cyberwar
5. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence
6. Usable Secure Private Search
7. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent
8. Frank Miller: Inventor of the One-Time Pad
9. High Performance Firewalls in MANETs
10. Policy Refinement of Network Services for MANETs
11. Privacy Enhanced Access Control for Outsourced Data Sharing
12. The Failure of Online Social Network Privacy Settings
13. A Real World Identity Management System with Master Secret Revocation
14. Identity and Security
15. Privacy-Preserving, Taxable Bank Accounts
16. Simple-VPN: Simple IPsec Configuration
17. Trade-offs in Private Search
18. An Anonymous Credit Card System
19. An Anonymous Credit Card System
20. APOD: Anonymous Physical Object Delivery
21. A Secure and Privacy-Preserving Targeted Ad-System
22. Configuration Management and Security
23. Cybersecurity through an Identity Management System
24. Guidelines for Specifying the Use of IPsec Version 2
25. Laissez-faire file sharing: Access control designed for individuals at the endpoints
26. Secure Anonymous Database Search
27. Security as a Systems Property
28. Source Prefix Filtering in ROFL
29. The Government and Cybersecurity
30. The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
31. Two-Person Control Administration: Preventing Administration Faults through Duplication
32. A Better Approach than Carrier-Grade-NAT
33. An Algebra for Integration and Analysis of Ponder2 Policies
34. Newspeak: A Secure Approach for Designing Web Applications
35. PAR: Payment for Anonymous Routing
36. Reputation Systems for Anonymous Networks
37. Risking Communications Security: Potential Hazards of the Protect America Act
38. ROFL: Routing as the Firewall Layer
39. RUST: A Retargetable Usability Testbed for Website Authentication Technologies
40. Security Assurance for Web Device APIs
41. Security by Checklist
42. The Puzzle of Privacy
43. DRM, Complexity, and Correctness
44. Key Change Strategies for TCP-MD5
45. OpenTor: Anonymity as a Commodity Service
46. Policy Algebras for Hybrid Firewalls
47. Privacy-Enhanced Searches Using Encrypted Bloom Filters
48. Reputation Systems for Anonymous Networks
49. Seers and Craftspeople
50. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
- « Previous
- Next »
- 1
- 2
- 3