Sciweavers

1564 search results - page 178 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
USITS
2003
14 years 11 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen
CCS
2010
ACM
14 years 10 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
CCS
2010
ACM
14 years 10 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim
DAM
2006
121views more  DAM 2006»
14 years 10 months ago
Fine-grained forward-secure signature schemes without random oracles
We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-...
Jan Camenisch, Maciej Koprowski
ECR
2002
160views more  ECR 2002»
14 years 9 months ago
A New Micro-Payment System Using General Payword Chain
In recent years electronic commerce has grown rapidly as Internet and web technologies have progressed. Therefore, a secure and efficient payment system for general-purpose applic...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin