Sciweavers

319 search results - page 35 / 64
» Identification Protocols Secure against Reset Attacks
Sort
View
DRM
2006
Springer
15 years 4 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
88
Voted
ACNS
2009
Springer
143views Cryptology» more  ACNS 2009»
15 years 7 months ago
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
Abstract. We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, whi...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
112
Voted
CCS
2007
ACM
15 years 6 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
110
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 7 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
112
Voted
IWIA
2005
IEEE
15 years 6 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen