102
click to vote
SPW
15 years 2 months ago
2004 Springer
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
102
click to vote
SPW
15 years 2 months ago
2004 Springer
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
SPW
15 years 2 months ago
2004 Springer
This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block c...
SPW
15 years 2 months ago
2004 Springer
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
SPW
15 years 2 months ago
2004 Springer
This paper identifies certain privacy threats that apply to anonymous credential systems. The focus is on timing attacks that apply even if the system is cryptographically secure....
|