Sciweavers

5722 search results - page 122 / 1145
» Security Function Interactions
Sort
View
112
Voted
INTERACT
2007
15 years 2 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 6 months ago
Round-Optimal Secure Two-Party Computation
Abstract. We consider the central cryptographic task of secure twoparty computation, where two parties wish to compute some function of their private inputs (each receiving possibl...
Jonathan Katz, Rafail Ostrovsky
93
Voted
FSTTCS
2003
Springer
15 years 6 months ago
Moderately Hard Functions: From Complexity to Spam Fighting
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the ...
Moni Naor
134
Voted
COMPLEXITY
2007
151views more  COMPLEXITY 2007»
15 years 21 days ago
From complex conflicts to stable cooperation: Cases in environment and security
: Conflict is a dynamic and complex form of human interaction, often emerging from incompatible actions, values and goals, and consuming a considerable amount of resources. Conflic...
Jürgen Scheffran, Bruce Hannon
CHES
2008
Springer
128views Cryptology» more  CHES 2008»
15 years 2 months ago
Hash Functions and RFID Tags: Mind the Gap
Abstract. The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is ...
Andrey Bogdanov, Gregor Leander, Christof Paar, Ax...