Sciweavers

40 search results - page 7 / 8
» Public Key Authentication with One (Online) Single Addition
Sort
View
WPES
2003
ACM
13 years 11 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
FOCS
2004
IEEE
13 years 9 months ago
Universally Composable Protocols with Relaxed Set-Up Assumptions
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally Composable (UC) protocols provide th...
Boaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafa...
STORAGESS
2005
ACM
13 years 11 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
PAM
2011
Springer
12 years 8 months ago
FACT: Flow-Based Approach for Connectivity Tracking
More than 20 years after the launch of the public Internet, operator forums are still full of reports about temporary unreachability of complete networks. We propose FACT, a system...
Dominik Schatzmann, Simon Leinen, Jochen Köge...
BMCBI
2008
130views more  BMCBI 2008»
13 years 5 months ago
Gene Prospector: An evidence gateway for evaluating potential susceptibility genes and interacting risk factors for human diseas
Background: Millions of single nucleotide polymorphisms have been identified as a result of the human genome project and the rapid advance of high throughput genotyping technology...
Wei Yu, Anja Wulf, Tiebin Liu, Muin J. Khoury, Mar...