Sciweavers

1064 search results - page 119 / 213
» Cryptography from Anonymity
Sort
View
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 9 months ago
A Highly Legible CAPTCHA That Resists Segmentation Attacks
A CAPTCHA which humans find to be highly legible and which is designed to resist automatic character–segmentation attacks is described. As first detailed in [BR05], these ‘Sc...
Henry S. Baird, Michael A. Moll, Sui-Yu Wang
TCC
2005
Springer
77views Cryptology» more  TCC 2005»
15 years 9 months ago
Upper and Lower Bounds on Black-Box Steganography
We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negati...
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russ...
NSPW
2004
ACM
15 years 9 months ago
Symmetric behavior-based trust: a new paradigm for internet computing
Current models of Internet Computing are highly asymmetric – a host protects itself from malicious mobile Java programs, but there is no way to get assurances about the behavior...
Vivek Haldar, Michael Franz
SRDS
2003
IEEE
15 years 9 months ago
SNARE: A Strong Security Scheme for Network-Attached Storage
This paper presents a strong security scheme for network-attached storage (NAS) that is based on capability and uses a key distribution scheme to keep network-attached storage fro...
Yingwu Zhu, Yiming Hu
132
Voted
ACNS
2003
Springer
129views Cryptology» more  ACNS 2003»
15 years 9 months ago
Using Feedback to Improve Masquerade Detection
Abstract. To gain access to account privileges, an intruder masquerades as the proper account user. Information from user feedback helps to improve the accuracy of classifiers use...
Kwong H. Yung