Sciweavers

1970 search results - page 68 / 394
» Security Without Firewalls
Sort
View
EUROCRYPT
2008
Springer
15 years 1 months ago
Towards Key-Dependent Message Security in the Standard Model
Standard security notions for encryption schemes do not guarantee any security if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion of security...
Dennis Hofheinz, Dominique Unruh
IM
2007
15 years 1 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
ACSAC
2009
IEEE
15 years 3 months ago
Reflections on UNIX Vulnerabilities
The UNIX operating system was developed in a friendly, collaborative environment without any particular predefined objectives. As it entered less friendly environments, expanded it...
Matt Bishop
IACR
2011
115views more  IACR 2011»
13 years 11 months ago
Threshold Encryption into Multiple Ciphertexts
We propose (T, N) multi-ciphertext scheme for symmetric encryption. The scheme encrypts a message into N distinct ciphertexts. The knowledge of the symmetric key allows decryption ...
Martin Stanek
ICMB
2005
IEEE
73views Business» more  ICMB 2005»
15 years 5 months ago
MMPS: A Versatile Mobile-to-Mobile Payment System
The paper presents an effective mobile-to-mobile payment system. A mobile phone with or without SIM card is enabled as an EMV payment instrument and is linked to a debit or credit...
Ashutosh Saxena, Manik Lal Das, Anurag Gupta