Sciweavers

5722 search results - page 404 / 1145
» Security Function Interactions
Sort
View
117
Voted
ACSAC
2010
IEEE
15 years 2 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
142
Voted
HCI
2009
15 years 1 months ago
txteagle: Mobile Crowdsourcing
We present txteagle, a system that enables people to earn small amounts of money by completing simple tasks on their mobile phone for corporations who pay them in either airtime or...
Nathan Eagle
ASIACRYPT
2004
Springer
15 years 9 months ago
Eliminating Random Permutation Oracles in the Even-Mansour Cipher
Abstract. Even and Mansour [EM97] proposed a block cipher construction that takes a publicly computable random permutation oracle P and XORs different keys prior to and after appl...
Craig Gentry, Zulfikar Ramzan
WICSA
2001
15 years 5 months ago
A Compositional Approach for Constructing Connectors
Increasingly, systems are composed from independently developed parts, and mechanisms that allow those parts to interact (connectors). In many situations, specialized forms of int...
Bridget Spitznagel, David Garlan
CRYPTO
2006
Springer
129views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
New Proofs for
HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent...
Mihir Bellare