Sciweavers

5843 search results - page 201 / 1169
» Software Security in Practice
Sort
View
DEXAW
2009
IEEE
124views Database» more  DEXAW 2009»
15 years 11 months ago
Performance Comparison of Secure Comparison Protocols
Secure Multiparty Computation (SMC) has gained tremendous importance with the growth of the Internet and E-commerce, where mutually untrusted parties need to jointly compute a fun...
Florian Kerschbaum, Debmalya Biswas, Sebastiaan de...
126
Voted
POLICY
2007
Springer
15 years 11 months ago
Web Services Security: Challenges and Techniques
Web Services based computing is currently an important driver for the software industry. While several standards bodies (such as W3C and OASIS) are laying the foundation for Web S...
Anoop Singhal
143
Voted
ACISP
2003
Springer
15 years 10 months ago
The Unsolvable Privacy Problem and Its Implications for Security Technologies
Abstract. Privacy presents many puzzles. In particular, why is it eroding, given the high value people assign to their privacy? This extended argues that there are strong incentive...
Andrew M. Odlyzko
137
Voted
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
15 years 9 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
ASIACRYPT
2008
Springer
15 years 7 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh