Sciweavers

2846 search results - page 11 / 570
» Not one click for security
Sort
View
163
Voted
DAGSTUHL
2007
15 years 4 months ago
Exploiting Community Behavior for Enhanced Link Analysis and Web Search
Methods for Web link analysis and authority ranking such as PageRank are based on the assumption that a user endorses a Web page when creating a hyperlink to this page. There is a...
Julia Luxenburger, Gerhard Weikum
139
Voted
IACR
2011
90views more  IACR 2011»
14 years 3 months ago
On the Security of the Winternitz One-Time Signature Scheme
Abstract. We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudo random ...
Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andre...
INTELLCOMM
2004
Springer
15 years 8 months ago
Secure Many-to-One Transmission of q-ary Symbols
There is a number of applications requiring a community of many senders to transmit some real-time information to a single receiver. Using unicast connections to send this traffic ...
Antoni Martínez-Ballesté, Francesc S...
137
Voted
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
15 years 8 months ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert
160
Voted
SPW
2004
Springer
15 years 8 months ago
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
Frank Stajano