Sciweavers

1317 search results - page 65 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
NSPW
2006
ACM
15 years 10 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann
CSE
2009
IEEE
15 years 8 months ago
Social Tagging in Query Expansion: A New Way for Personalized Web Search
Social networks and collaborative tagging systems are rapidly gaining popularity as primary means for sorting and sharing data: users tag their bookmarks in order to simplify infor...
Claudio Biancalana, Alessandro Micarelli
SEFM
2007
IEEE
15 years 10 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
ESORICS
2006
Springer
15 years 8 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
FC
2010
Springer
181views Cryptology» more  FC 2010»
15 years 8 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...