Sciweavers

ICICS
2004
Springer
13 years 10 months ago
Robust Metering Schemes for General Access Structures
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They sho...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
ICICS
2004
Springer
13 years 10 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
ICICS
2004
Springer
13 years 10 months ago
On Some Weak Extensions of AES and BES
In 2002, Murphy and Robshaw introduced an extension BES of AES and argued this could compromise the security of AES. We introduce here two block-ciphers CES and Big-BES that are so...
Jean Monnerat, Serge Vaudenay
ICICS
2004
Springer
13 years 10 months ago
Dynamic Access Control for Multi-privileged Group Communications
Abstract. Recently, there is an increase in the number of group communication applications which support multiple service groups of different access privileges. Traditional access...
Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li
ICICS
2004
Springer
13 years 10 months ago
Factorization-Based Fail-Stop Signatures Revisited
Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even i...
Katja Schmidt-Samoa
ICICS
2004
Springer
13 years 10 months ago
Adaptive-CCA on OpenPGP Revisited
E-mail system has become one of the most important and popular Internet services. Instead of using traditional surface mail, we have the alternative of employing e-mail system whic...
Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen
ICICS
2004
Springer
13 years 10 months ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...
ICICS
2004
Springer
13 years 10 months ago
Hydan: Hiding Information in Program Binaries
We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection proces...
Rakan El-Khalil, Angelos D. Keromytis
ICICS
2004
Springer
13 years 10 months ago
Time-Scoped Searching of Encrypted Audit Logs
Darren Davis, Fabian Monrose, Michael K. Reiter
ICICS
2004
Springer
13 years 10 months ago
A New Key-Insulated Signature Scheme
In this paper we propose a new strong and perfectly key-insulated signature scheme, more efficient than previous proposals and whose key length is constant and independent of the n...
Nicolás González-Deleito, Olivier Ma...