Sciweavers

2846 search results - page 128 / 570
» Not one click for security
Sort
View
JOC
2007
94views more  JOC 2007»
15 years 4 months ago
On Unconditionally Secure Distributed Oblivious Transfer
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one o...
Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Dou...
CCS
2005
ACM
15 years 10 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
PAISI
2007
Springer
15 years 10 months ago
Informed Recognition in Software Watermarking
Software watermarking is a technique to protect programs from piracy through embedding secret information into the programs. As software unauthorized use and modification are ubiq...
William Zhu
138
Voted
CSREASAM
2006
15 years 6 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
SERP
2004
15 years 6 months ago
Using UML in a Risk-Driven Development Process
Risk-driven development focus on identifying and treating risks as an integrated part of the development process. One then obtain an adequate security level by treating security i...
Siv Hilde Houmb, Ørjan Markhus Lillevik