Sciweavers

26 search results - page 5 / 6
» Small trusted primitives for dependable systems
Sort
View
SACMAT
2009
ACM
13 years 12 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
FSE
2005
Springer
116views Cryptology» more  FSE 2005»
13 years 11 months ago
Narrow T-Functions
T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building ...
Magnus Daum
EUROCRYPT
1995
Springer
13 years 9 months ago
Quantum Oblivious Mutual Identification
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and e...
Claude Crépeau, Louis Salvail
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
13 years 11 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
MM
2004
ACM
136views Multimedia» more  MM 2004»
13 years 10 months ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski