Sciweavers

123 search results - page 19 / 25
» Modelling the relative strength of security protocols
Sort
View
IH
1998
Springer
13 years 11 months ago
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System
Abstract. Currently knownbasic anonymitytechniques dependon identity veri cation. If veri cation of user identities is not possible due to the related management overhead or a gene...
Dogan Kesdogan, Jan Egner, Roland Büschkes
JOC
2007
133views more  JOC 2007»
13 years 7 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
ICCV
2007
IEEE
14 years 9 months ago
Axon radius measurements in vivo from diffusion MRI: a feasibility study
This paper investigates the feasibility of using diffusion MRI to measure axon-cell dimensions in the white matter of live subjects. A simple geometric model of white-matter tissu...
Daniel C. Alexander
FSTTCS
2007
Springer
14 years 1 months ago
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Abstract. The abstraction of cryptographic operations by term algebras, called DolevYao models or symbolic cryptography, is essential in almost all tool-supported methods for provi...
Michael Backes, Markus Dürmuth, Ralf Küs...
HPCC
2005
Springer
14 years 27 days ago
A Hybrid Web Server Architecture for Secure e-Business Web Applications
Nowadays the success of many e-commerce applications, such as on-line banking, depends on their reliability, robustness and security. Designing a web server architecture that keep...
Vicenç Beltran, David Carrera, Jordi Guitar...