Sciweavers

1317 search results - page 11 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
15 years 8 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
MVA
1998
117views Computer Vision» more  MVA 1998»
14 years 11 months ago
A system for a new two-dimensional code: Secure 2D code
Abstract. A new 2D code called Secure 2D code is designed in this paper, both encoder and decoder are also proposed. Secure 2D code can store any kind of data and provides high sec...
Chung-Tsai Yeh, Ling-Hwei Chen
HASE
1998
IEEE
15 years 4 months ago
A New Heuristic to Discriminate between Transient and Intermittent Faults
Effective discrimination between transient and permanent faults is a very important practical problem in (dependable) system design. A count-andthreshold mechanism named -count, d...
Fabrizio Grandoni 0002, Andrea Bondavalli, Silvano...
USS
2008
15 years 2 months ago
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems
In light of the systemic vulnerabilities uncovered by recent reviews of deployed e-voting systems, the surest way to secure the voting process would be to scrap the existing syste...
J. Alex Halderman, Eric Rescorla, Hovav Shacham, D...
CCS
2007
ACM
15 years 5 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...