Sciweavers

2363 search results - page 52 / 473
» How Secure is RFID
Sort
View
IJISEC
2006
108views more  IJISEC 2006»
15 years 4 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
DBSEC
2006
125views Database» more  DBSEC 2006»
15 years 5 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
GECCO
2003
Springer
15 years 9 months ago
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It
This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties...
John A. Clark, Jeremy L. Jacob, Susan Stepney
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
15 years 11 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...
CCS
2007
ACM
15 years 10 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...