Sciweavers

FC
2010
Springer
145views Cryptology» more  FC 2010»
13 years 3 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
FC
2010
Springer
176views Cryptology» more  FC 2010»
13 years 5 months ago
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
J. Melia-Segui, Joaquín García-Alfar...
FC
2010
Springer
158views Cryptology» more  FC 2010»
13 years 5 months ago
A Secure and Privacy-Preserving Targeted Ad-System
Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods vio...
Elli Androulaki, Steven M. Bellovin
FC
2010
Springer
164views Cryptology» more  FC 2010»
13 years 5 months ago
Practical Private Set Intersection Protocols with Linear Complexity
Emiliano De Cristofaro, Gene Tsudik
FC
2010
Springer
175views Cryptology» more  FC 2010»
13 years 6 months ago
Cryptographic Cloud Storage
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We...
Seny Kamara, Kristin Lauter
FC
2010
Springer
157views Cryptology» more  FC 2010»
13 years 6 months ago
A Framework for Understanding and Applying Ethical Principles in Network and Security Research
Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and a...
Erin Kenneally, Michael Bailey, Douglas Maughan
FC
2010
Springer
260views Cryptology» more  FC 2010»
13 years 6 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
FC
2010
Springer
180views Cryptology» more  FC 2010»
13 years 6 months ago
Lighten Encryption Schemes for Secure and Private RFID Systems
We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precis...
Sébastien Canard, Iwen Coisel, Jonathan Etr...
FC
2010
Springer
150views Cryptology» more  FC 2010»
13 years 6 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner