Sciweavers

14850 search results - page 117 / 2970
» The Security of
Sort
View
CCS
2003
ACM
14 years 3 months ago
Automatic generation of two-party computations
Philip D. MacKenzie, Alina Oprea, Michael K. Reite...
CCS
2003
ACM
14 years 3 months ago
XML access control using static analysis
Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Sat...
ACSAC
2002
IEEE
14 years 3 months ago
Controlled Physical Random Functions
Blaise Gassend, Dwaine E. Clarke, Marten van Dijk,...
ACISP
2001
Springer
14 years 2 months ago
On Classifying Conference Key Distribution Protocols
In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4...
Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Su...