Sciweavers

CCS
2003
ACM
13 years 9 months ago
Randomized instruction set emulation to disrupt binary code injection attacks
Elena Gabriela Barrantes, David H. Ackley, Trek S....
CCS
2003
ACM
13 years 9 months ago
A composable cryptographic library with nested operations
Michael Backes, Birgit Pfitzmann, Michael Waidner
CCS
2003
ACM
13 years 9 months ago
Security proofs for an efficient password-based key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointch...
CCS
2003
ACM
13 years 9 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
CCS
2003
ACM
13 years 9 months ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper