Sciweavers

1190 search results - page 163 / 238
» Secure off-the-record messaging
Sort
View
94
Voted
ICICS
1997
Springer
15 years 4 months ago
Enforcing traceability in software
Traceability is a property of a communications protocol that ensures that the origin and/or destination of messages can be identified. The aims of this paper are twofold. Firstly t...
Colin Boyd
90
Voted
EUROCRYPT
2006
Springer
15 years 4 months ago
The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model
In this paper we examine the security criteria for a KEM and a DEM that are sufficient for the overall hybrid encryption scheme to be plaintext-aware in the standard model. We appl...
Alexander W. Dent
90
Voted
ICISC
2004
122views Cryptology» more  ICISC 2004»
15 years 2 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
65
Voted
IADIS
2003
15 years 2 months ago
Anti-Sniffing in Unbounded Networks
Along with the trend in networked computing environments towards largely unbounded network infrastructures, the traditional anti-sniffing issue meets a great challenge. This paper...
Xiu-guo Bao, Ming-zheng Hu, Xiao-chun Yun, Ri Ding
80
Voted
PDPTA
2004
15 years 2 months ago
Web Service Robust GridFTP
In this paper, we discuss reliable and secure file transfer middleware called NaradaBrokering. It is our goal to show that reliability features can be decoupled from the implementa...
Sang Lim, Geoffrey Fox, Shrideep Pallickara, Marlo...