Sciweavers

757 search results - page 130 / 152
» How secure are secure interdomain routing protocols
Sort
View
ICEB
2004
175views Business» more  ICEB 2004»
13 years 9 months ago
Privacy-Preserving Collaborative Association Rule Mining
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among parties i...
Justin Z. Zhan, Stan Matwin, Nathalie Japkowicz, L...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Michael Szydlo, Yiqun Lisa Yin
SNPD
2004
13 years 9 months ago
Payment-Based Email
Spam is a major problem facing email today, and current solutions are ineffective. This paper presents our progress towards defining and implementing a payment-based email deliver...
David A. Turner, Ni Deng
IACR
2011
115views more  IACR 2011»
12 years 7 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky
CCS
2009
ACM
14 years 8 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen