Sciweavers

CCS
2003
ACM
15 years 10 months ago
Randomized instruction set emulation to disrupt binary code injection attacks
Elena Gabriela Barrantes, David H. Ackley, Trek S....
81
Voted
CCS
2003
ACM
15 years 10 months ago
A composable cryptographic library with nested operations
Michael Backes, Birgit Pfitzmann, Michael Waidner
88
Voted
CCS
2003
ACM
15 years 10 months ago
Security proofs for an efficient password-based key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointch...
CCS
2003
ACM
15 years 10 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
CCS
2003
ACM
15 years 10 months ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper