Sciweavers

ISW
2009
Springer
14 years 6 months ago
Towards Unifying Vulnerability Information for Attack Graph Construction
Sebastian Roschke, Feng Cheng 0002, Robert Schuppe...
ISW
2009
Springer
14 years 6 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
ISW
2009
Springer
14 years 6 months ago
Security Analysis of the PACE Key-Agreement Protocol
We analyze the Password Authenticated Connection Establishment (PACE) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Secur...
Jens Bender, Marc Fischlin, Dennis Kügler
ISW
2009
Springer
14 years 6 months ago
A2M: Access-Assured Mobile Desktop Computing
Angelos Stavrou, Ricardo A. Barrato, Angelos D. Ke...
ISW
2009
Springer
14 years 6 months ago
Fair E-Cash: Be Compact, Spend Faster
Sébastien Canard, Cécile Delerabl&ea...
ISW
2009
Springer
14 years 6 months ago
On Free-Start Collisions and Collisions for TIB3
In this paper, we present free-start collisions for the TIB3 hash function with a complexity of about 232 compression function evaluations. By using message modification technique...
Florian Mendel, Martin Schläffer
ISW
2009
Springer
14 years 6 months ago
Analysis and Optimization of Cryptographically Generated Addresses
Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux
ISW
2009
Springer
14 years 6 months ago
Adding Trust to P2P Distribution of Paid Content
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver th...
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos...
ISW
2009
Springer
14 years 6 months ago
A Calculus to Detect Guessing Attacks
Bogdan Groza, Marius Minea