Sciweavers

1294 search results - page 46 / 259
» Securing Against Insider Attacks
Sort
View
SASN
2004
ACM
15 years 4 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner
FC
2009
Springer
104views Cryptology» more  FC 2009»
15 years 5 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
15 years 3 months ago
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers. The paradigm involves composing an all-or-nothing...
Anand Desai
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 4 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 7 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum