Sciweavers

55 search results - page 3 / 11
» Addressing the Problem of Undetected Signature Key Compromis...
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
RECOMB
2002
Springer
14 years 7 months ago
String barcoding: uncovering optimal virus signatures
There are many critical situations when one needs to rapidly identify an unidentified pathogen from among a given set of previously sequenced pathogens. DNA or RNA hybridization c...
Sam Rash, Dan Gusfield
JSAC
2011
142views more  JSAC 2011»
13 years 2 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
DIMVA
2008
13 years 9 months ago
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
Abstract. This paper presents a novel framework to substantiate selfsigned certificates in the absence of a trusted certificate authority. In particular, we aim to address the prob...
Brett Stone-Gross, David Sigal, Rob Cohn, John Mor...
PET
2010
Springer
13 years 11 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg