Sciweavers

5665 search results - page 238 / 1133
» Introduction to Computer Security
Sort
View
AINA
2004
IEEE
14 years 2 months ago
An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET)
A secure MANET system, called SMANET, was developed that accepts only those packets whose MAC addresses are in the Linux iptable firewall rules. Detailed iptable set up and the pe...
C. Edward Chow, Paul J. Fong, Ganesh Godavari
IJNSEC
2008
103views more  IJNSEC 2008»
13 years 10 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
14 years 11 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
14 years 2 months ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval
NSDI
2008
14 years 22 days ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner