Browsing by Subject "Security"
Now showing items 1-4 of 4
-
Information Slicing: Anonymity Using Unreliable Overlays
(2007-02-23)This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the public keys of the nodes along the path. ...
-
Memoization Attacks and Copy Protection in Partitioned Applications
(2006-12-08)Application source code protection is a major concern for software architects today. Secure platforms have been proposed that protect the secrecy of application algorithms and enforce copy protection assurances. Unfortunately, ...
-
Privacy and Security Risks for National Health Records Systems
(2018-01-24)A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security ...
-
TIARA: Trust Management, Intrusion-tolerance, Accountability, and Reconstitution Architecture
(2007-05-30)The last 20 years have led to unprecedented improvements in chipdensity and system performance fueled mainly by Moore's Law. Duringthe same time, system and application software have bloated, leadingto unmanageable ...