Sciweavers

SPW
2004
Springer
14 years 5 months ago
The Dancing Bear: A New Way of Composing Ciphers
This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block c...
Ross Anderson
SPW
2004
Springer
14 years 5 months ago
Towards a Mechanism for Discretionary Overriding of Access Control
Erik Rissanen, Babak Sadighi Firozabadi, Marek J. ...
SPW
2004
Springer
14 years 5 months ago
Anonymous Authentication
Partha Das Chowdhury, Bruce Christianson, James A....
SPW
2004
Springer
14 years 5 months ago
BLIND: A Complete Identity Protection Framework for End-Points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
Jukka Ylitalo, Pekka Nikander
SPW
2004
Springer
14 years 5 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
SPW
2004
Springer
14 years 5 months ago
Accountable Privacy
Hardly a day passes without reports of new threats in or about the Internet. Denial of service, worms, viruses, spam, and divulged credit card information highlight the major secu...
Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Al...
SPW
2004
Springer
14 years 5 months ago
Pseudonymity in the Light of Evidence-Based Trust
This position paper discusses the relation of privacy, namely pseudonymity, to evidence-based trust (or rather reputation). Critical concepts of evidence-based trust/reputation sys...
Daniel Cvrcek, Václav Matyás Jr.
SPW
2004
Springer
14 years 5 months ago
A Cryptographic Framework for the Controlled Release of Certified Data
Endre Bangerter, Jan Camenisch, Anna Lysyanskaya
SPW
2004
Springer
14 years 5 months ago
Limits to Anonymity When Using Credentials
This paper identifies certain privacy threats that apply to anonymous credential systems. The focus is on timing attacks that apply even if the system is cryptographically secure....
Andreas Pashalidis, Chris J. Mitchell