Sciweavers

3451 search results - page 104 / 691
» Collaborative attack modeling
Sort
View
ISPEC
2011
Springer
13 years 1 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
CHI
2007
ACM
14 years 10 months ago
He says, she says: conflict and coordination in Wikipedia
Wikipedia, a wiki-based encyclopedia, has become one of the most successful experiments in collaborative knowledge building on the Internet. As Wikipedia continues to grow, the po...
Aniket Kittur, Bongwon Suh, Bryan A. Pendleton, Ed...
EUROCRYPT
2000
Springer
14 years 1 months ago
Authenticated Key Exchange Secure against Dictionary Attacks
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, ...
Mihir Bellare, David Pointcheval, Phillip Rogaway