Sciweavers

EUROCRYPT
2012
Springer
11 years 7 months ago
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
We present a new approach for creating chosen ciphertext secure encryption. The focal point ork is a new abstraction that we call Detectable Chosen Ciphertext Security (DCCA). Int...
Susan Hohenberger, Allison B. Lewko, Brent Waters
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
11 years 7 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
HCSE
2010
13 years 2 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
CRITIS
2007
13 years 6 months ago
The Structure of the Sense of Security, Anshin
Traditional research on security has been based on the assumption that users would feel secure when provided with secure systems and services. In this research we address factors ...
Yuko Murayama, Natsuko Hikage, Yasuhiro Fujihara, ...
ACSAC
2007
IEEE
13 years 8 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby
NSPW
2003
ACM
13 years 9 months ago
Bringing security home: a process for developing secure and usable systems
The aim of this paper is to provide better support for the development of secure systems. We argue that current development practice suffers from two key problems:
Ivan Flechais, Martina Angela Sasse, Stephen Haile...
SIGOPSE
2004
ACM
13 years 10 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...
BIRTHDAY
2005
Springer
13 years 10 months ago
Towards MultiMedia Instruction in Safe and Secure Systems
Abstract. The aim of the MMiSS project is the construction of a multimedia Internet-based adaptive educational system. Its content will initially cover a whole curriculum in the ar...
Bernd Krieg-Brückner
DRM
2007
Springer
13 years 10 months ago
Digital rights management: desirable, inevitable, and almost irrelevant
provides a very brief overview of some of the main points. References are given to my papers, where those points are explained in more detail, and citations are provided to the ext...
Andrew M. Odlyzko
ICDCSW
2007
IEEE
13 years 11 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato