Sciweavers

1564 search results - page 255 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
ASPLOS
2011
ACM
14 years 1 months ago
S2E: a platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software systems. We demonstrate S2E’s use in developing practical tools for comprehensive perfo...
Vitaly Chipounov, Volodymyr Kuznetsov, George Cand...
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
14 years 19 days ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
DOCENG
2011
ACM
13 years 9 months ago
Contributions to the study of SMS spam filtering: new collection and results
The growth of mobile phone users has lead to a dramatic increasing of SMS spam messages. In practice, fighting mobile phone spam is difficult by several factors, including the lo...
Tiago A. Almeida, José María G&oacut...
IACR
2011
86views more  IACR 2011»
13 years 9 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
TCC
2012
Springer
240views Cryptology» more  TCC 2012»
13 years 5 months ago
Computing on Authenticated Data
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slight...
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohe...