Sciweavers

CCS
2003
ACM
14 years 25 days ago
Randomized instruction set emulation to disrupt binary code injection attacks
Elena Gabriela Barrantes, David H. Ackley, Trek S....
CCS
2003
ACM
14 years 25 days ago
A composable cryptographic library with nested operations
Michael Backes, Birgit Pfitzmann, Michael Waidner
CCS
2003
ACM
14 years 25 days ago
Security proofs for an efficient password-based key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointch...
CCS
2003
ACM
14 years 25 days ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
CCS
2003
ACM
14 years 25 days ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper