Sciweavers

75
Voted
CCS
1993
ACM
15 years 4 months ago
Systematic Generation of Cryptographically Robust S-Boxes
Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
103
Voted
CCS
1993
ACM
15 years 4 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secu...
Gene Tsudik, Els Van Herreweghen
97
Voted
CCS
1993
ACM
15 years 4 months ago
Denial of Service
Roger M. Needham
126
Voted
CCS
1993
ACM
15 years 4 months ago
NetCash: A Design for Practical Electronic Currency on the Internet
NetCash is a framework that supports realtime electronic payments with provision of anonymity over an unsecure network. It is designed to enable new types of services on the Inter...
Gennady Medvinsky, B. Clifford Neuman
89
Voted
CCS
1993
ACM
15 years 4 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
115
Voted
CSFW
1994
IEEE
15 years 4 months ago
Conceptual Foundations for a Model of Task-based Authorizations
Ravi S. Sandhu, Roshan K. Thomas
CSFW
1994
IEEE
15 years 4 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann
56
Voted
CSFW
1993
IEEE
15 years 4 months ago
On Testing for Absence of Rights in Access Control Models
Ravi S. Sandhu, Srinivas Ganta