Sciweavers

1777 search results - page 142 / 356
» Programming Cryptographic Protocols
Sort
View
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
DIM
2005
ACM
15 years 3 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
TRUST
2010
Springer
15 years 6 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
CCGRID
2006
IEEE
15 years 7 months ago
A Relaxed-Criteria Bargaining Protocol for Grid Resource Management
Since participants in a computational Grid may be independent bodies, some mechanisms are necessary for resolving their differences. The contribution of this work is designing a b...
Kwang Mong Sim, Ka Fung Ng
AINA
2007
IEEE
15 years 5 months ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...