Sciweavers

154 search results - page 25 / 31
» Modeling and Analyzing Security in the Presence of Compromis...
Sort
View
JCP
2007
122views more  JCP 2007»
13 years 7 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
EUROSYS
2010
ACM
14 years 17 days ago
Residue objects: a challenge to web browser security
A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be...
Shuo Chen, Hong Chen, Manuel Caballero
ATC
2007
Springer
14 years 1 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
CSFW
2009
IEEE
14 years 2 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 9 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray