Sciweavers

ISW
2005
Springer
13 years 10 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
ISW
2005
Springer
13 years 10 months ago
A Privacy Preserving Rental System
Abstract. Rental records contain much sensitive information on individuals, so if abused by the rental service providers, user privacy could be jeopardized. To mitigate this concer...
Yanjiang Yang, Beng Chin Ooi
ISW
2005
Springer
13 years 10 months ago
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation
In this paper, we examine general mechanisms that a covert channel may exploit and derive new minimum requirements for setting up a covert channel. We also propose a new classifica...
Zhenghong Wang, Ruby B. Lee
ISW
2005
Springer
13 years 10 months ago
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
This paper is primarily concerned with the CBC block cipher mode. The impact on the usability of this mode of recently proposed padding oracle attacks, together with other related ...
Chris J. Mitchell
ISW
2005
Springer
13 years 10 months ago
An Oblivious Transfer Protocol with Log-Squared Communication
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol for -bit strings with low-degree polylogarithmic receivercomputation, linear send...
Helger Lipmaa
ISW
2005
Springer
13 years 10 months ago
A Practical Voting Scheme with Receipts
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, ...
ISW
2005
Springer
13 years 10 months ago
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
Hongxia Jin, Ginger Myles, Jeffery Lotspiech
ISW
2005
Springer
13 years 10 months ago
Tracing-by-Linking Group Signatures
In a group signature [19], any group member can sign on behalf of the group while remaining anonymous, but its identity can be traced in an future dispute investigation. Essentiall...
Victor K. Wei
ISW
2005
Springer
13 years 10 months ago
Universally Composable Time-Stamping Schemes with Audit
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan...