Sciweavers

CCS
1993
ACM
14 years 3 months ago
Systematic Generation of Cryptographically Robust S-Boxes
Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
CCS
1993
ACM
14 years 3 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secu...
Gene Tsudik, Els Van Herreweghen
CCS
1993
ACM
14 years 3 months ago
Denial of Service
Roger M. Needham
CCS
1993
ACM
14 years 3 months ago
NetCash: A Design for Practical Electronic Currency on the Internet
NetCash is a framework that supports realtime electronic payments with provision of anonymity over an unsecure network. It is designed to enable new types of services on the Inter...
Gennady Medvinsky, B. Clifford Neuman
CCS
1993
ACM
14 years 3 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
CSFW
1994
IEEE
14 years 3 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann