Sciweavers

CCS
2013
ACM
10 years 2 months ago
A security framework for the analysis and design of software attestation
Software attestation has become a popular and challenging research topic at many established security conferences with an expected strong impact in practice. It aims at verifying ...
Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Sc...
ACISP
2013
Springer
10 years 2 months ago
Analysing the IOBC Authenticated Encryption Mode
The idea of combining a very simple form of added plaintext redundancy with a special mode of data encryption to provide data integrity is an old one; however, despite its wide dep...
Chris J. Mitchell
ESORICS
2014
Springer
10 years 2 months ago
Quantifying and Measuring Anonymity
Abstract. The design of anonymous communication systems is a relatively new field, but the desire to quantify the security these systems offer has been an important topic of rese...
Steven J. Murdoch
CODASPY
2014
10 years 2 months ago
On the suitability of dissemination-centric access control systems for group-centric sharing
The Group-centric Secure Information Sharing (g-SIS) family of models has been proposed for modeling environments in which group dynamics dictate information-sharing policies and ...
William C. Garrison III, Yechen Qiao, Adam J. Lee
ESORICS
2012
Springer
11 years 9 months ago
Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing
Tracking information flow in dynamic languages remains an open challenge. It might seem natural to address the challenge by runtime monitoring. However, there are well-known funda...
Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld
ESORICS
2012
Springer
11 years 9 months ago
Formal Analysis of Privacy in an eHealth Protocol
Given the sensitive nature of health data, privacy of eHealth systems is of prime importance. An eHealth system must enforce that users remain private, even if they are bribed or c...
Naipeng Dong, Hugo Jonker, Jun Pang
ESORICS
2012
Springer
11 years 9 months ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...
ESORICS
2012
Springer
11 years 9 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
ESORICS
2012
Springer
11 years 9 months ago
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a cli...
Lei Wei 0004, Michael K. Reiter
ESORICS
2012
Springer
11 years 9 months ago
Unique Group Signatures
We initiate the study of unique group signature such that signatures of the same message by the same user will always have a large common component (i.e., unique identifier). It ...
Matthew K. Franklin, Haibin Zhang