Sciweavers

116 search results - page 19 / 24
» A Security Model for Anonymous Credential Systems
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 1 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
SACMAT
2003
ACM
14 years 17 days ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
13 years 12 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon
IFIP
2005
Springer
14 years 25 days ago
Opacity Generalised to Transition Systems
Recently, opacity has proved to be a promising technique for describing security properties. Much of the work has been couched in terms of Petri nets. Here, we extend the notion of...
Jeremy Bryans, Maciej Koutny, Laurent Mazaré...
PET
2012
Springer
11 years 9 months ago
Understanding Statistical Disclosure: A Least Squares Approach
It is widely accepted that Disclosure Attacks are effective against high-latency anonymous communication systems. A number of Disclosure Attack variants can be found in the litera...
Fernando Pérez-González, Carmela Tro...