Sciweavers

499 search results - page 54 / 100
» A Study on Latent Vulnerabilities
Sort
View
98
Voted
ASIACRYPT
2001
Springer
15 years 5 months ago
Provably Secure Fair Blind Signatures with Tight Revocation
A fair blind signature scheme allows the trustee to revoke blindness so that it provides authenticity and anonymity to honest users while preventing malicious users from abusing th...
Masayuki Abe, Miyako Ohkubo
89
Voted
ACMICEC
2007
ACM
134views ECommerce» more  ACMICEC 2007»
15 years 4 months ago
Vindictive bidding in keyword auctions
We study vindictive bidding, a strategic bidding behavior in keyword auctions where a bidder forces his competitor to pay more without affecting his own payment. We show that most...
Yunhong Zhou, Rajan M. Lukose
ASIACRYPT
2008
Springer
15 years 2 months ago
Slide Attacks on a Class of Hash Functions
This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher cryptanalysis. But, as shown in the current paper, they ...
Michael Gorski, Stefan Lucks, Thomas Peyrin
106
Voted
CCS
2008
ACM
15 years 2 months ago
Is complexity really the enemy of software security?
Software complexity is often hypothesized to be the enemy of software security. We performed statistical analysis on nine code complexity metrics from the JavaScript Engine in the...
Yonghee Shin, Laurie Williams
106
Voted
SSWMC
2004
15 years 1 months ago
Statistical amplitude scale estimation for quantization-based watermarking
Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore the scaling factor has to be accounted for either at the encoder, or at the decoder, prior t...
Ivo D. Shterev, Reginald L. Lagendijk, Richard Heu...