Sciweavers

1288 search results - page 121 / 258
» Securing aspect composition
Sort
View
MSR
2011
ACM
13 years 1 months ago
Security versus performance bugs: a case study on Firefox
A good understanding of the impact of different types of bugs on various project aspects is essential to improve software quality research and practice. For instance, we would ex...
Shahed Zaman, Bram Adams, Ahmed E. Hassan
STACS
2010
Springer
14 years 5 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
14 years 5 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
EUROCRYPT
2010
Springer
14 years 3 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
CSFW
2008
IEEE
14 years 4 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal