Showing 1 - 10 of 132
In this thesis we discuss two demanding problems from the field of computer and communication security that involve …, other than in traditional computer security problems, the adversary has a lot of control over the situation. The untrusted … ways: We propose relaxed, but still practically useful, notions of security for the DSP problem; we identify theoretical …
Persistent link: https://www.econbiz.de/10009467070
nicht voll vertrauenswŸrdigen Dienstanbieter betrachtet. Wir untersuchen die Grenzen der Sicherheit, die in diesem Szenario … erreicht werden kšnnen. Sicherheit wird dabei unter Zuhilfenahme aktueller komplexitŠtstheoretischer Arbeiten definiert. Dies … ermšglicht die Verwendung formaler Methoden zur Untersuchung der Bedingungen, unter denen verschiedene Grade von Sicherheit …
Persistent link: https://www.econbiz.de/10009467071
herausgearbeitet, wobei insbesondere mehrseitige Sicherheit und die Perspektive der IOTNS-Clients berŸcksichtigt werden, die in den … information about this object. This thesis discusses the information security challenges involved in the design and use of an IOT … discussed, including multilateral security and the client perspective, which have been neglected in IOT standards and research …
Persistent link: https://www.econbiz.de/10009467072
Rapide Fortschritte in der Netzwerk- und Speichertechnologie haben dazu geführt, dass Informationen über viele verschiedene Quellen wie z.B. Personal Computer oder Datenbanken verstreut sind. Weil diese Informationen oft auch sehr heterogen sind, wurde gleichzeitig die Entwicklung effektiver...
Persistent link: https://www.econbiz.de/10009467121
justice must be fully implemented already now, i.e., under the regime to succeed the Kyoto Protocol. First, the increase in …
Persistent link: https://www.econbiz.de/10009467052
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434833
The attraction of cloud computing is obvious with noticeable freedom from managing and hosting applications, platforms … disadvantages such as security, privacy, reliability, physical location of data and the unavailability of service due to crashes or …
Persistent link: https://www.econbiz.de/10009434867
When considering information security and privacy issues most of the attention has previously focused on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434918
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434924
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating...
Persistent link: https://www.econbiz.de/10009434970