Sciweavers

CCS
2001
ACM
14 years 4 days ago
The BiBa one-time signature and broadcast authentication protocol
Ï ÒØÖÓ Ù Ø × Ò ØÙÖ × Ñ ¸ Ò Û × Ò ØÙÖ ÓÒ×ØÖÙ Ø ÓÒ Ø Ø Ù× × ÓÒ ¹Û Ý ÙÒ Ø ÓÒ× Û Ø ÓÙØ ØÖ Ô ÓÓÖ׺ ØÙÖ × ÐÓÛ Ú Ö ¬...
Adrian Perrig
CCS
2001
ACM
14 years 4 days ago
Twin signatures: an alternative to the hash-and-sign paradigm
David Naccache, David Pointcheval, Jacques Stern
CCS
2001
ACM
14 years 4 days ago
Taking the Copy Out of Copyright
Under current U.S. law and common understanding, the fundamental right granted by copyright is the right of reproduction – of making copies. Indeed, the very word “copyright”...
Ernest Miller, Joan Feigenbaum
CCS
2001
ACM
14 years 4 days ago
Delegation of cryptographic servers for capture-resilient devices
Abstract. A device that performs private key operations (signatures or decryptions), and whose private key operations are protected by a password, can be immunized against offline...
Philip D. MacKenzie, Michael K. Reiter
CCS
2001
ACM
14 years 4 days ago
Constraint solving for bounded-process cryptographic protocol analysis
The reachability problem for cryptographic protocols with nonatomic keys can be solved via a simple constraint satisfaction procedure.
Jonathan K. Millen, Vitaly Shmatikov
CCS
2001
ACM
14 years 4 days ago
New Iterative Geometric Methods for Robust Perceptual Image Hashing
We propose a novel and robust hashing paradigm that uses iterative geometric techniques and relies on observations that main geometric features within an image would approximately ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
CCS
2001
ACM
14 years 4 days ago
Formalizing GDOI group key management requirements in NPATRL
Although there is a substantial amount of work on formal requirements for two and three-party key distribution protocols, very little has been done on requirements for group proto...
Catherine Meadows, Paul F. Syverson
CCS
2001
ACM
14 years 4 days ago
Distributed credential chain discovery in trust management: extended abstract
Ninghui Li, William H. Winsborough, John C. Mitche...
CCS
2001
ACM
14 years 4 days ago
Secure Open Systems for Protecting Privacy and Digital Services
This paper describes and analyzes a system architecture that enables consumers to access services and content from multiple providers without jeopardizing the privacy interests of...
David W. Kravitz, Kim-Ee Yeoh, Nicol So