Sciweavers

920 search results - page 128 / 184
» Selecting Secure Passwords
Sort
View
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 2 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
IACR
2011
173views more  IACR 2011»
12 years 9 months ago
All-But-Many Lossy Trapdoor Functions
We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many lossy trapdoor functions (ABM-LTFs) are LTFs that are parametrized with tags. Each tag can...
Dennis Hofheinz
ICDE
2003
IEEE
130views Database» more  ICDE 2003»
14 years 10 months ago
StegFS: A Steganographic File System
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release decryption keys for stored data once the presence ...
HweeHwa Pang, Kian-Lee Tan, Xuan Zhou
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 9 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...