Sciweavers

1564 search results - page 69 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
15 years 2 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
ASIACRYPT
2008
Springer
14 years 11 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
ICALP
2007
Springer
15 years 4 months ago
A "proof-reading" of Some Issues in Cryptography
Abstract. In this paper, we identify some issues in the interplay between practice and theory in cryptography, issues that have repeatedly appeared in different incarnations over ...
Ivan Damgård
CCS
2010
ACM
15 years 4 months ago
A lattice-based approach to mashup security
A web mashup is a web application that integrates content from different providers to create a new service, not offered by the content providers. As mashups grow in popularity, ...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 4 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...