Sciweavers

5722 search results - page 6 / 1145
» Security Function Interactions
Sort
View
ASIACRYPT
2000
Springer
14 years 28 days ago
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
Block ciphers are usually based on one top-level scheme into which we plug “round functions”. To analyze security, it is important to study the intrinsic security provided by t...
Shiho Moriai, Serge Vaudenay
NDSS
2000
IEEE
14 years 29 days ago
An IPSec-based Host Architecture for Secure Internet Multicast
We propose a host architecture for secure IP multicast. We identify the basic components of the architecture, describe their functionalities and how they interact with one another...
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Di...
HUC
2009
Springer
14 years 1 months ago
A spotlight on security and privacy risks with future household robots: attacks and lessons
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
Tamara Denning, Cynthia Matuszek, Karl Koscher, Jo...
EUROCRYPT
2006
Springer
14 years 7 days ago
Information-Theoretic Conditions for Two-Party Secure Function Evaluation
The standard security definition of unconditional secure function evaluation, which is based on the ideal/real model paradigm, has the disadvantage of being overly complicated to w...
Claude Crépeau, George Savvides, Christian ...
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
14 years 3 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang