Sciweavers

CCS
2003
ACM
14 years 26 days ago
Randomized instruction set emulation to disrupt binary code injection attacks
Elena Gabriela Barrantes, David H. Ackley, Trek S....
CCS
2003
ACM
14 years 26 days ago
A composable cryptographic library with nested operations
Michael Backes, Birgit Pfitzmann, Michael Waidner
CCS
2003
ACM
14 years 26 days ago
Security proofs for an efficient password-based key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointch...
CCS
2003
ACM
14 years 26 days ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
CCS
2003
ACM
14 years 26 days ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
ACISP
2003
Springer
14 years 27 days ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
ACISP
2003
Springer
14 years 27 days ago
An Anonymous Credential System and a Privacy-Aware PKI
Abstract. In this paper we present a non-transferable anonymous credential system that is based on the concept of a chameleon certificate. A chameleon certificate is a special ce...
Pino Persiano, Ivan Visconti
ACISP
2003
Springer
14 years 27 days ago
A Taxonomy of Single Sign-On Systems
Abstract. At present, network users have to manage one set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single...
Andreas Pashalidis, Chris J. Mitchell
ACISP
2003
Springer
14 years 27 days ago
The Unsolvable Privacy Problem and Its Implications for Security Technologies
Abstract. Privacy presents many puzzles. In particular, why is it eroding, given the high value people assign to their privacy? This extended argues that there are strong incentive...
Andrew M. Odlyzko