Sciweavers

1562 search results - page 71 / 313
» Mathematics, Cryptology, Security
Sort
View
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
13 years 12 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 10 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
FC
2005
Springer
157views Cryptology» more  FC 2005»
14 years 1 months ago
Securing Sensitive Data with the Ingrian DataSecure Platform
Recent high profile data thefts have shown that perimeter defenses are not sufficient to secure important customer data. The damage caused by these thefts can be disastrous, and to...
Andrew Koyfman
FC
2003
Springer
125views Cryptology» more  FC 2003»
14 years 1 months ago
Economics, Psychology, and Sociology of Security
Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human...
Andrew M. Odlyzko
FSE
2004
Springer
150views Cryptology» more  FSE 2004»
14 years 1 months ago
Ciphers Secure against Related-Key Attacks
Abstract. In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the transformed key. This paper studies the secu...
Stefan Lucks