Sciweavers

5722 search results - page 439 / 1145
» Security Function Interactions
Sort
View
IV
2002
IEEE
114views Visualization» more  IV 2002»
15 years 9 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
CRYPTO
2001
Springer
97views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
Two-Party Generation of DSA Signatures
d Abstract) Philip MacKenzie and Michael K. Reiter Bell Labs, Lucent Technologies, Murray Hill, NJ, USA We describe a means of sharing the DSA signature function, so that two parti...
Philip D. MacKenzie, Michael K. Reiter
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
15 years 8 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
ASIACRYPT
2006
Springer
15 years 8 months ago
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
This paper presents a secure constant-round password-based group key exchange protocol in the common reference string model. Our protocol is based on the group key exchange protoco...
Michel Abdalla, David Pointcheval
DIMVA
2004
15 years 5 months ago
Structural Comparison of Executable Objects
: A method to heuristically construct an isomorphism between the sets of functions in two similar but differing versions of the same executable file is presented. Such an isomorphi...
Halvar Flake