Sciweavers

197 search results - page 28 / 40
» Feasibility of Multi-Protocol Attacks
Sort
View
116
Voted
IJCAI
1997
15 years 3 months ago
Understanding Three Simultaneous Speeches
Understanding three simultaneous speeches is proposed as a challenge problem to foster artificial intelligence, speech and sound understanding or recognition, and computational au...
Hiroshi G. Okuno, Tomohiro Nakatani, Takeshi Kawab...
ESORICS
2010
Springer
15 years 2 months ago
Kamouflage: Loss-Resistant Password Management
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager i...
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan ...
SOCIALCOM
2010
14 years 11 months ago
q-Anon: Rethinking Anonymity for Social Networks
This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as kanonymity...
Aaron Beach, Mike Gartrell, Richard Han
143
Voted
JAR
2000
145views more  JAR 2000»
15 years 1 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
138
Voted
IEEEARES
2010
IEEE
14 years 11 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...