Sciweavers

1564 search results - page 248 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
HICSS
2000
IEEE
147views Biometrics» more  HICSS 2000»
15 years 2 months ago
Persistence and Lurkers in Discussion Lists: A Pilot Study
In email-based discussion lists (DLs), messages resident in archives, email clients and elsewhere are persistent. One way of examining persistent messages is through the eyes of l...
Blair Nonnecke, Jennifer Preece
COCOON
2000
Springer
15 years 2 months ago
Recent Progress and Prospects for Integer Factorisation Algorithms
The integer factorisation and discrete logarithm problems are of practical importance because of the widespread use of public key cryptosystems whose security depends on the presum...
Richard P. Brent
COOPIS
1998
IEEE
15 years 2 months ago
Context Mediation on Wall Street
This paper reports on a practical implementation of a context mediator for the fixed income securities industry. We describe industry circumstances and the data and calculation se...
Allen Moulton, Stuart E. Madnick, Michael Siegel
ASIACRYPT
1998
Springer
15 years 2 months ago
Analysis Methods for (Alleged) RC4
Abstract. The security of the alleged RC4 stream cipher and some variants is investigated. Cryptanalytic algorithms are developed for a known plaintext attack where only a small se...
Lars R. Knudsen, Willi Meier, Bart Preneel, Vincen...
91
Voted
FC
1998
Springer
134views Cryptology» more  FC 1998»
15 years 2 months ago
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash
In this paper we construct a practical group blind signature scheme. Our scheme combines the already existing notions of blind signatures and group signatures. It is an extension o...
Anna Lysyanskaya, Zulfikar Ramzan