Sciweavers

848 search results - page 99 / 170
» Secure Information Flow for Distributed Systems
Sort
View
IACR
2011
129views more  IACR 2011»
13 years 11 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
ICDCSW
2008
IEEE
15 years 6 months ago
Real-Time Data Services for Cyber Physical Systems
Cyber Physical Systems (CPSs) have grand visions with great socio-economic impacts such as blackout-free electricity supply and real-time disaster recovery. A key challenge is pro...
Kyoung-Don Kang, Sang Hyuk Son
ESORICS
2008
Springer
15 years 1 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 3 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
WISA
2005
Springer
15 years 5 months ago
Video Fingerprinting System Using Wavelet and Error Correcting Code
In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the ...
Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, H...