Sciweavers

1790 search results - page 308 / 358
» On Privacy Models for RFID
Sort
View
CCS
2010
ACM
13 years 8 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CSFW
2011
IEEE
12 years 11 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
GIL
2011
12 years 10 months ago
Information Services for Agri-Food Supply Chains - A Framework for Development
Abstract: Several global developments such as the growing demand for bioenergy, limits in the availability of water and diminishing production resources as well as sector-wide cris...
Richard J. Lehmann, Robert Reiche, Melanie Fritz, ...
IACR
2011
73views more  IACR 2011»
12 years 10 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
CSFW
2012
IEEE
12 years 1 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...