Sciweavers

569 search results - page 33 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
ICWS
2009
IEEE
14 years 5 months ago
Analysis of Signature Wrapping Attacks and Countermeasures
In recent research it turned out that Boolean verification of digital signatures in the context of WSSecurity is likely to fail: If parts of a SOAP message are signed and the sig...
Sebastian Gajek, Meiko Jensen, Lijun Liao, Jö...
ACSAC
2006
IEEE
14 years 2 months ago
Enhancing Collaborative Spam Detection with Bloom Filters
Signature-based collaborative spam detection (SCSD) systems provide a promising solution addressing many problems facing statistical spam filters, the most widely adopted technol...
Jeff Yan, Pook Leong Cho
CCS
2006
ACM
14 years 7 days ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
SPW
1997
Springer
14 years 19 days ago
Secure Books: Protecting the Distribution of Knowledge
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
Ross J. Anderson, Václav Matyás Jr.,...
CCS
2003
ACM
14 years 1 months ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...