Sciweavers

3544 search results - page 76 / 709
» Information Security in Open Systems
Sort
View
USENIX
2003
15 years 11 days ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
DIM
2006
ACM
15 years 5 months ago
OpenID 2.0: a platform for user-centric identity management
With the advancement in user-centric and URI-based identity systems over the past two years, it has become clear that a single specification will not be the solution to all proble...
David Recordon, Drummond Reed
JCS
2008
124views more  JCS 2008»
14 years 11 months ago
Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober
IMC
2009
ACM
15 years 5 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 5 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore