Sciweavers

487 search results - page 31 / 98
» Integral Invariant Signatures
Sort
View
PKC
2009
Springer
180views Cryptology» more  PKC 2009»
16 years 2 months ago
Security of Sanitizable Signatures Revisited
Sanitizable signature schemes, as defined by Ateniese et al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the s...
Anja Lehmann, Christina Brzuska, Dominique Schr&ou...
IEEEARES
2006
IEEE
15 years 8 months ago
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF
Abstract— Most e-government applications have to find a solution for simple, reliable, secure and authentic signing of official documents. Citizens need a simple way to verify ...
Thomas Neubauer, Edgar Weippl, Stefan Biffl
ACSAC
2008
IEEE
15 years 8 months ago
Automatic Inference and Enforcement of Kernel Data Structure Invariants
Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Arati Baliga, Vinod Ganapathy, Liviu Iftode
ITC
2003
IEEE
181views Hardware» more  ITC 2003»
15 years 7 months ago
Latch Divergency In Microprocessor Failure Analysis
This paper presents an approach for analysis of system state differences observable through the scan chain for the debug of functional failures. A novel methodology for Latch Dive...
Peter Dahlgren, Paul Dickinson, Ishwar Parulkar
CSREASAM
2006
15 years 3 months ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang