Sciweavers

5722 search results - page 81 / 1145
» Security Function Interactions
Sort
View
TCC
2012
Springer
227views Cryptology» more  TCC 2012»
12 years 4 months ago
Hardness Preserving Constructions of Pseudorandom Functions
We show a hardness-preserving construction of a PRF from any length doubling PRG which improves upon known constructions whenever we can put a non-trivial upper bound q on the numb...
Abhishek Jain, Krzysztof Pietrzak, Aris Tentes
IEEEARES
2010
IEEE
14 years 3 months ago
Security and Usability: Analysis and Evaluation
Abstract—The differences between the fields of HumanComputer Interaction and Security (HCISec) and HumanComputer Interaction (HCI) have not been investigated very closely. Many ...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ICS
2010
Tsinghua U.
14 years 6 months ago
Non-Malleable Codes
We introduce the notion of "non-malleable codes" which relaxes the notion of error-correction and errordetection. Informally, a code is non-malleable if the message cont...
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wic...
IEEEARES
2007
IEEE
14 years 3 months ago
AProSec: an Aspect for Programming Secure Web Applications
Adding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should tak...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...
COMPSAC
2006
IEEE
14 years 2 months ago
An Aspect-Oriented Approach to Security Requirements Analysis
This paper presents an aspect-oriented approach to integrated elicitation of functional and security requirements based on use case-driven development. We identify security threat...
Dianxiang Xu, Vivek Goel, Kendall E. Nygard