Sciweavers

FC
2010
Springer
173views Cryptology» more  FC 2010»
13 years 5 months ago
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+ volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its ...
Karsten Loesing, Steven J. Murdoch, Roger Dingledi...
FC
2010
Springer
166views Cryptology» more  FC 2010»
13 years 5 months ago
Ethical Proactive Threat Research
John Aycock, John Sullins
FC
2010
Springer
166views Cryptology» more  FC 2010»
13 years 5 months ago
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
Daniel Engels, Xinxin Fan, Guang Gong, Honggang Hu...
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 5 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
FC
2010
Springer
140views Cryptology» more  FC 2010»
13 years 7 months ago
Intention-Disguised Algorithmic Trading
William Yuen, Paul F. Syverson, Zhenming Liu, Chri...
FC
2010
Springer
169views Cryptology» more  FC 2010»
13 years 7 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
FC
2010
Springer
226views Cryptology» more  FC 2010»
13 years 7 months ago
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
Abstract. Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully ob...
Toni Perkovic, Mario Cagalj, Nitesh Saxena
FC
2010
Springer
155views Cryptology» more  FC 2010»
13 years 8 months ago
Embedded SFE: Offloading Server and Network Using Hardware Tokens
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
FC
2010
Springer
209views Cryptology» more  FC 2010»
13 years 8 months ago
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy
We introduce the novel notion of Verifiable Encryption of Chameleon Signatures (VECS), and then use it to design a three-round abuse-free optimistic contract signing protocol. Key...
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong...
FC
2010
Springer
191views Cryptology» more  FC 2010»
13 years 8 months ago
Using Sphinx to Improve Onion Routing Circuit Construction
This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit constru...
Aniket Kate, Ian Goldberg