Sciweavers

849 search results - page 102 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
FC
2010
Springer
183views Cryptology» more  FC 2010»
15 years 8 months ago
Automatically Preparing Safe SQL Queries
We present the first sound program source transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsa...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
FC
2001
Springer
94views Cryptology» more  FC 2001»
15 years 9 months ago
Mutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical imp...
Markus Jakobsson, David Pointcheval
DBA
2004
88views Database» more  DBA 2004»
15 years 6 months ago
A Flexible Database Authorization System
In this paper we present an authorization mechanism for a relational database. It allows defining the user privileges exact to a table row. To implement that we used the INSTEAD t...
Bazyli Blicharski, Krzysztof Stencel
CORR
2011
Springer
195views Education» more  CORR 2011»
14 years 11 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
186
Voted
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 8 months ago
Online Ciphers from Tweakable Blockciphers
Abstract. Online ciphers are deterministic length-preserving permutations EK : ({0, 1}n )+ → ({0, 1}n )+ where the i-th block of ciphertext depends only on the first i blocks of...
Phillip Rogaway, Haibin Zhang