Sciweavers

12478 search results - page 282 / 2496
» Secure Interaction Design
Sort
View
ICALP
2007
Springer
15 years 6 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
DAGSTUHL
2007
15 years 6 months ago
Tightness of the Security Bound of CENC
CENC (Cipher-based ENCryption) is the recently designed encryption mode for blockciphers. It is provably secure with beyond the birthday bound. In this note, we present a simple di...
Tetsu Iwata
155
Voted
TDSC
2008
119views more  TDSC 2008»
15 years 4 months ago
Architectural Risk Analysis of Software Systems Based on Security Patterns
The importance of software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Further...
Spyros T. Halkidis, Nikolaos Tsantalis, Alexander ...
125
Voted
ACSAC
2004
IEEE
15 years 8 months ago
.NET Security: Lessons Learned and Missed from Java
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
122
Voted
PERCOM
2010
ACM
15 years 3 months ago
Bridging the gap between users and smart products
—The increasing number of interactive products in our environment leads to an accession of interaction between products and users. Nowadays, this interaction is described with di...
Marcus Stander