Sciweavers

149 search results - page 21 / 30
» Securing Optical-Scan Voting
Sort
View
CCS
2008
ACM
13 years 9 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
CCS
2010
ACM
13 years 7 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
12 years 10 months ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
PET
2007
Springer
14 years 1 months ago
Attacking Unlinkability: The Importance of Context
A system that protects the unlinkability of certain data items (e. g. identifiers of communication partners, messages, pseudonyms, transactions, votes) does not leak information t...
Matthias Franz, Bernd Meyer, Andreas Pashalidis
FC
2008
Springer
107views Cryptology» more  FC 2008»
13 years 9 months ago
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Abstract. We examine the structure and outcomes of user participation in PhishTank, a phishing-report collator. Anyone who wishes may submit URLs of suspected phishing websites, an...
Tyler Moore, Richard Clayton