Sciweavers

12637 search results - page 52 / 2528
» Security for Extensible Systems
Sort
View
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}â...
Ueli M. Maurer, Stefano Tessaro
PDCAT
2007
Springer
14 years 1 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
ESORICS
2004
Springer
14 years 1 months ago
A Host Intrusion Prevention System for Windows Operating Systems
Roberto Battistoni, Emanuele Gabrielli, Luigi V. M...
CCS
2000
ACM
14 years 9 hour ago
Operating system enhancements to prevent the misuse of system calls
Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Ma...
CCS
2005
ACM
14 years 1 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters