Sciweavers

5665 search results - page 226 / 1133
» Introduction to Computer Security
Sort
View
100
Voted
CCS
2003
ACM
15 years 7 months ago
PPay: micropayments for peer-to-peer systems
Emerging economic P2P applications share the common need for an efficient, secure payment mechanism. In this paper, we present PPay, a micropayment system that exploits unique cha...
Beverly Yang, Hector Garcia-Molina
133
Voted
CCS
1998
ACM
15 years 6 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
C3S2E
2009
ACM
15 years 6 months ago
A verification framework for access control in dynamic web applications
This paper proposes a security analysis framework for dynamic web applications. A reverse engineering process is performed over a dynamic web application to extract a rolebased ac...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
110
Voted
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
15 years 5 months ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 2 months ago
Advanced Software Protection Now
We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalitie...
Diego Bendersky, Ariel Futoransky, Luciano Notarfr...