Sciweavers

1564 search results - page 162 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
ESORICS
2004
Springer
15 years 10 months ago
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
Bodo Möller
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
15 years 10 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
CRYPTO
2001
Springer
95views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
Robustness for Free in Unconditional Multi-party Computation
We present a very efficient multi-party computation protocol unconditionally secure against an active adversary. The security is maximal, i.e., active corruption of up to t < n/...
Martin Hirt, Ueli M. Maurer
SPW
2001
Springer
15 years 9 months ago
On the Negotiation of Access Control Policies
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...
ETRICS
2006
15 years 8 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme