Sciweavers

1402 search results - page 190 / 281
» Personalized privacy preservation
Sort
View
ESORICS
2004
Springer
15 years 6 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
103
Voted
EUROPKI
2004
Springer
15 years 6 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
96
Voted
ACSAC
2003
IEEE
15 years 6 months ago
Synthesizing Test Data for Fraud Detection Systems
This paper reports an experiment aimed at generating synthetic test data for fraud detection in an IP based videoon-demand service. The data generation verifies a methodology pre...
Emilie Lundin Barse, Håkan Kvarnström, ...
ACSAC
2003
IEEE
15 years 6 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
SP
2003
IEEE
15 years 5 months ago
Random Key Predistribution Schemes for Sensor Networks
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because th...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song