Sciweavers

905 search results - page 5 / 181
» The Case Against Micropayments
Sort
View
COMPSAC
2006
IEEE
13 years 10 months ago
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks
This paper proposes an improved free-roaming mobile agent security protocol. The scheme uses "one hop backwards and two hops forwards" chain relation as the protocol cor...
Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Lu...
STOC
2006
ACM
141views Algorithms» more  STOC 2006»
14 years 7 months ago
Zero-knowledge against quantum attacks
It is proved that several interactive proof systems are zero-knowledge against general quantum attacks. This includes the Goldreich?Micali?Wigderson classical zero-knowledge proto...
John Watrous
ACSAC
2000
IEEE
13 years 11 months ago
Security Against Compelled Disclosure
Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be tu...
Ian Brown, B. Laurie
ICICS
1999
Springer
13 years 11 months ago
Reaction Attacks against several Public-Key Cryptosystems
Abstract. We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their ...
Chris Hall, Ian Goldberg, Bruce Schneier
FSE
2006
Springer
104views Cryptology» more  FSE 2006»
13 years 10 months ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller