Sciweavers

1116 search results - page 137 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
WISA
2004
Springer
14 years 1 months ago
License Protection with a Tamper-Resistant Token
Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that i...
Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro E...
ACSAC
2003
IEEE
14 years 1 months ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
IANDC
2008
120views more  IANDC 2008»
13 years 8 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
FOCS
2010
IEEE
13 years 5 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
ECIR
2010
Springer
13 years 6 months ago
Biometric Response as a Source of Query Independent Scoring in Lifelog Retrieval
Personal lifelog archives contain digital records captured from an individual’s daily life, e.g. emails, web pages downloaded and SMSs sent or received. While capturing this info...
Liadh Kelly, Gareth J. F. Jones