Sciweavers

3544 search results - page 570 / 709
» Information Security in Open Systems
Sort
View
EUROPKI
2004
Springer
15 years 4 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
SDMW
2004
Springer
15 years 4 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
ACSAC
2003
IEEE
15 years 4 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
15 years 4 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
ACSAC
2002
IEEE
15 years 4 months ago
GOSSIB vs. IP Traceback Rumors
Abstract—To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking ...
Marcel Waldvogel