Sciweavers

25 search results - page 2 / 5
» How to break XML encryption
Sort
View
SWS
2004
ACM
13 years 11 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
SYRCODIS
2008
127views Database» more  SYRCODIS 2008»
13 years 7 months ago
On the Semantics of Updates in a Functional Language
Issues related to updating data in native XML database systems are studied extensively nowadays. In this work we consider a problem of updating typed XML documents having their sc...
Pavel Loupal
CCS
1998
ACM
13 years 10 months ago
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze Microsoft's Windows NT implementation of PPTP. We s...
Bruce Schneier, Mudge
AES
2000
Springer
136views Cryptology» more  AES 2000»
13 years 10 months ago
Preliminary Cryptanalysis of Reduced-Round Serpent
Serpent is a 32-round AES block cipher finalist. In this paper we present several attacks on reduced-round variants of Serpent that require less work than exhaustive search. We at...
Tadayoshi Kohno, John Kelsey, Bruce Schneier
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
13 years 10 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool