Sciweavers

CCS
2001
ACM
13 years 10 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
CCS
2001
ACM
13 years 10 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
CCS
2001
ACM
13 years 10 months ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...
CCS
2001
ACM
13 years 10 months ago
Twin signatures: an alternative to the hash-and-sign paradigm
David Naccache, David Pointcheval, Jacques Stern
CCS
2001
ACM
13 years 10 months ago
Implications of Digital Rights Management for Online Music - A Business Perspective
This paper will examine and categorize potential business model scenarios for online music. The virtualization of music leads to market uncertainties. On the supply side, the offer...
Willms Buhse
Security Privacy
Top of PageReset Settings