Sciweavers

299 search results - page 4 / 60
» Deniable Authentication on the Internet
Sort
View
WPES
2005
ACM
13 years 11 months ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
ICPADS
2005
IEEE
13 years 11 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
FOCS
2000
IEEE
13 years 10 months ago
Zaps and Their Applications
A zap is a two-round, public coin witness-indistinguishable protocol in which the first round, consisting of a message from the verifier to the prover, can be fixed “once and...
Cynthia Dwork, Moni Naor
WWW
2005
ACM
14 years 6 months ago
Merkle tree authentication of HTTP responses
Roberto J. Bayardo, Jeffrey S. Sorensen
SEMWEB
2010
Springer
13 years 3 months ago
Using Semantics for Automating the Authentication of Web APIs
Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications bas...
Maria Maleshkova, Carlos Pedrinaci, John Domingue,...