Sciweavers

398 search results - page 56 / 80
» Errors in Attacks on Authentication Protocols
Sort
View
OSDI
2000
ACM
13 years 8 months ago
Proactive Recovery in a Byzantine-Fault-Tolerant System
This paper describes an asynchronous state-machine replication system that tolerates Byzantine faults, which can be caused by malicious attacks or software errors. Our system is t...
Miguel Castro, Barbara Liskov
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
13 years 11 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
WWW
2008
ACM
14 years 8 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
IPSN
2003
Springer
14 years 18 days ago
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
Jing Deng, Richard Han, Shivakant Mishra
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs