Sciweavers

548 search results - page 87 / 110
» Secure peer sampling
Sort
View
DIMVA
2008
14 years 18 days ago
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
Abstract. This paper presents a novel framework to substantiate selfsigned certificates in the absence of a trusted certificate authority. In particular, we aim to address the prob...
Brett Stone-Gross, David Sigal, Rob Cohn, John Mor...
TACAS
2010
Springer
137views Algorithms» more  TACAS 2010»
14 years 6 months ago
Statistical Measurement of Information Leakage
Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the ...
Konstantinos Chatzikokolakis, Tom Chothia, Apratim...
CSE
2009
IEEE
14 years 6 months ago
Names of Our Lives
—Identifiers are an essential component of online communication. My research focuses on the ways that social, technical and policy factors affect people’s behavior with online...
Benjamin M. Gross
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
14 years 5 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
CSREASAM
2006
14 years 17 days ago
Software Vaccine Technique and Its Application in Early Virus
: The paper introduces a new anti-virus idea of Software Vaccine technique. It can apply the security technique inside the software itself. By inserting the software vaccine into t...
Xiaodong Yuan, Dajiong Yue