Sciweavers

104 search results - page 10 / 21
» Protocol Interactions and the Chosen Protocol Attack
Sort
View
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
12 years 6 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 22 days ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
ICC
2007
IEEE
14 years 1 months ago
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment
— A novel client puzzle protocol, the Memoryless Puzzle Protocol (MPP), is proposed and investigated. The goal is to show that MPP is a viable solution for mitigating distributed...
Nicholas A. Fraser, Douglas J. Kelly, Richard A. R...
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
13 years 10 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
UIST
1999
ACM
13 years 11 months ago
Implementing Phicons: Combining Computer Vision with InfraRed Technology for Interactive Physical Icons
This paper describes a novel physical icon [3] or “phicon-” based system that can be programmed to issue a range of commands about what the user wishes to do with handdrawn wh...
Darnell J. Moore, Roy Want, Beverly L. Harrison, A...