171
click to vote
CCS
9 years 8 months ago
2015 ACM
A privacy policy is a statement informing users how their information will be collected, used, and disclosed. Failing to provide a correct privacy policy may result in a fine. Ho...
170
click to vote
ACISP
9 years 8 months ago
2015 Springer
Detecting malicious attempts to access computers is difficult with current security applications. Many current applications do not give the user the right information to find and ...
166
click to vote
CCS
9 years 8 months ago
2015 ACM
There have been several attempts recently at using homomorphic encryption to increase the efficiency of Oblivious RAM protocols. One of the most successful has been Onion ORAM, w...
160
click to vote
ACSAC
9 years 8 months ago
2015 IEEE
Client fingerprinting techniques enhance classical cookie-based user tracking to increase the robustness of tracking techniques. A unique identifier is created based on characte...
153
click to vote
CCS
9 years 8 months ago
2015 ACM
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we present a generic “fairy-ring dance” construction that transforms any secure two-party...
|