Sciweavers

1255 search results - page 112 / 251
» On Simple and Secure Key Distribution
Sort
View
131
Voted
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
15 years 9 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
138
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
111
Voted
COMPUTER
2004
120views more  COMPUTER 2004»
15 years 3 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
158
Voted
AFRICACRYPT
2009
Springer
15 years 10 months ago
Unifying Zero-Knowledge Proofs of Knowledge
Abstract. We present a simple zero-knowledge proof of knowledge protocol of which many protocols in the literature are instantiations. These include Schnorr’s protocol for provin...
Ueli M. Maurer
132
Voted
CLUSTER
2005
IEEE
15 years 9 months ago
A Generic Proxy Mechanism for Secure Middlebox Traversal
Firewalls/NATs have brought significant connectivity problems along with their benefits, causing many applications to break or become inefficient. Due to its bi-directional commun...
Se-Chang Son, Matthew Farrellee, Miron Livny