Sciweavers

195 search results - page 30 / 39
» Security and Privacy Using One-Round Zero-Knowledge Proofs
Sort
View
SOUPS
2009
ACM
15 years 6 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
15 years 6 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
CRYPTO
2008
Springer
123views Cryptology» more  CRYPTO 2008»
15 years 1 months ago
Collusion-Free Protocols in the Mediated Model
Prior approaches [15, 14] to building collusion-free protocols require exotic channels. By taking a conceptually new approach, we are able to use a more digitally-friendly communic...
Joël Alwen, Abhi Shelat, Ivan Visconti
CCS
2008
ACM
15 years 1 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
CCS
2006
ACM
15 years 3 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang