Sciweavers

1449 search results - page 179 / 290
» Secure and Efficient Metering
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
Session Privacy Enhancement by Traffic Dispersion
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
Haim Zlatokrilov, Hanoch Levy
153
Voted
CCS
2006
ACM
15 years 8 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
ESORICS
2006
Springer
15 years 8 months ago
Conditional Reactive Simulatability
Abstract. Simulatability has established itself as a salient notion for defining and proving the security of cryptographic protocols since it entails strong security and compositio...
Michael Backes, Markus Dürmuth, Dennis Hofhei...
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
16 years 5 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud
ECR
2002
160views more  ECR 2002»
15 years 4 months ago
A New Micro-Payment System Using General Payword Chain
In recent years electronic commerce has grown rapidly as Internet and web technologies have progressed. Therefore, a secure and efficient payment system for general-purpose applic...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin