Sciweavers

3486 search results - page 69 / 698
» On the Design and Security of RC2
Sort
View
SOUPS
2009
ACM
15 years 5 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
73
Voted
AGENTS
1998
Springer
15 years 3 months ago
Liability for Autonomous Agent Design
Though exciting scientifically, autonomous agent design can result in legal liability. This paper surveys those legal concerns, focusing on issues arising from the unique qualitie...
Carey Heckman, Jacob O. Wobbrock
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
15 years 3 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel
EUROCRYPT
1994
Springer
15 years 3 months ago
Designated Confirmer Signatures
Abstract. We construct the first O(1)-size designated confirmer signatures (DCS) with security in the state-of-the-art model of Camenisch and Michels, Eurocrypt 2000, without rando...
David Chaum
DIAU
2000
Springer
15 years 2 months ago
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
We present the traffic analysis problem and expose the most important protocols, attacks and design issues. Afterwards, we propose directions for further research. As we are mostl...
Jean-François Raymond