Sciweavers

25 search results - page 4 / 5
» fc 2009
Sort
View
FC
2009
Springer
135views Cryptology» more  FC 2009»
14 years 4 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags
FC
2009
Springer
112views Cryptology» more  FC 2009»
14 years 4 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
FC
2009
Springer
100views Cryptology» more  FC 2009»
14 years 4 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
FC
2009
Springer
118views Cryptology» more  FC 2009»
14 years 4 months ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
FC
2009
Springer
109views Cryptology» more  FC 2009»
14 years 4 months ago
Optimised to Fail: Card Readers for Online Banking
Abstract. The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used toge...
Saar Drimer, Steven J. Murdoch, Ross J. Anderson