Sciweavers

524 search results - page 81 / 105
» On the Security of the DeKaRT Primitive
Sort
View
94
Voted
ICALP
2005
Springer
15 years 7 months ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
15 years 7 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud
106
Voted
SAC
2010
ACM
15 years 7 months ago
Secret interest groups (SIGs) in social networks with an implementation on Facebook
In this paper we present the first framework that allows the creation of Secret Interest Groups (SIGs) in Online Social Networks; SIGs are self managed groups formed outside of t...
Alessandro Sorniotti, Refik Molva
83
Voted
ISI
2003
Springer
15 years 7 months ago
Active Database Systems for Monitoring and Surveillance
In many intelligence and security tasks it is necessary to monitor data in database in order to detect certain events or changes. Currently, database systems offer triggers to pro...
Antonio Badia
CRYPTO
2001
Springer
145views Cryptology» more  CRYPTO 2001»
15 years 6 months ago
Pseudorandomness from Braid Groups
Recently the braid groups were introduced as a new source for cryptography. The group operations are performed efficiently and the features are quite different from those of other...
Eonkyung Lee, Sangjin Lee, Sang Geun Hahn