×

Found 141 Documents (Results 1–100)

Knowledge problems in security protocols: going beyond subterm convergent theories. (English) Zbl 07929345

Gaboardi, Marco (ed.) et al., 8th international conference on formal structures for computation and deduction, FSCD 2023, Rome, Italy, July 3–6, 2023. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 260, Article 30, 19 p. (2023).
MSC:  03B70 68Qxx
Full Text: DOI

Best of both worlds. Revisiting the spymasters double agent problem. (English) Zbl 1531.94021

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14081, 328-359 (2023).
MSC:  94A60 68N20 68P25
Full Text: DOI

Augmented random oracles. (English) Zbl 1517.94168

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 35-65 (2022).
MSC:  94A60
Full Text: DOI

Environmentally friendly composable multi-party computation in the plain model from standard (timed) assumptions. (English) Zbl 1509.94072

Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13042, 750-781 (2021).
MSC:  94A60 68P25 68M14
Full Text: DOI

Foundations for actively secure card-based cryptography. (English) Zbl 1516.94038

Farach-Colton, Martin (ed.) et al., 10th international conference on fun with algorithms. FUN 2021, May 30 – June 1, 2021, Favignana Island, Sicily, Italy. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 157, Article 17, 23 p. (2020).
MSC:  94A60 68Q10
Full Text: DOI

Pine: enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment. (English) Zbl 1524.68044

Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12308, 3-22 (2020).

Formalizing and proving privacy properties of voting protocols using alpha-beta privacy. (English) Zbl 1496.68136

Sako, Kazue (ed.) et al., Computer security – ESORICS 2019. 24th European symposium on research in computer security, Luxembourg, September 23–27, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11735, 535-555 (2019).
MSC:  68P27 94A60

Brief announcement: Multiparty interactive communication with private channels. (English) Zbl 1543.68025

Nowak, Thomas (ed.), Proceedings of the 38th ACM symposium on principles of distributed computing, PODC ’19, Toronto, ON, Canada, July 29 – August 2, 2019. New York, NY: Association for Computing Machinery (ACM). 147-149 (2019).
Full Text: DOI

Practical and provably secure onion routing. (English) Zbl 1499.68044

Chatzigiannakis, Ioannis (ed.) et al., 45th international colloquium on automata, languages, and programming. ICALP 2018, Prague, Czech Republic, July 9–13, 2018. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 107, Article 144, 14 p. (2018).
MSC:  68M25 68M12 68P27

On communication models when verifying equivalence properties. (English) Zbl 1444.68035

Maffei, Matteo (ed.) et al., Principles of security and trust. 6th international conference, POST 2017, held as part of the European joint conferences on theory and practice of software, ETAPS 2017, Uppsala, Sweden, April 22–29, 2017. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 10204, 141-163 (2017).

Consensus algorithm with censored data for distributed detection with corrupted measurements: a game-theoretic approach. (English) Zbl 1448.68192

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 455-466 (2016).
Full Text: DOI

The hidden graph model: communication locality and optimal resiliency with adaptive faults. (English) Zbl 1365.68255

Proceedings of the 6th conference on innovations in theoretical computer science, ITCS’15, Rehovot, Israel, January 11–13, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3333-7). 153-162 (2015).
MSC:  68Q05 68M12 68Q10 68R10 94A60
Full Text: DOI

Strong security and privacy of RFID system for internet of things infrastructure. (English) Zbl 1355.68023

Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 56-69 (2013).
Full Text: DOI

Universally composable secure computation with (malicious) physically uncloneable functions. (English) Zbl 1300.68029

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 702-718 (2013).
MSC:  68P25 94A60
Full Text: DOI

Hybrid-secure MPC, trading information-theoretic robustness for computational privacy. (English) Zbl 1315.68121

Proceedings of the 29th annual ACM SIGACT-SIGOPS symposium on principles of distributed computing, PODC ’10, Zurich, Switzerland, July 25–28, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-888-9). 219-228 (2010).
Full Text: DOI

Intractable problems in cryptography. (English) Zbl 1222.94033

McGuire, Gary (ed.) et al., Finite fields. Theory and applications. Proceedings of the 9th international conference on finite fields and applications, Dublin, Ireland, July 13–17, 2009. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-4786-2/pbk). Contemporary Mathematics 518, 279-300 (2010).
MSC:  94A60 11T71 68P25

ISPs and ad networks against botnet ad fraud. (English) Zbl 1298.91071

Alpcan, Tansu (ed.) et al., Decision and game theory for security. First international conference, GameSec 2010, Berlin, Germany, November 22–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17196-3/pbk). Lecture Notes in Computer Science 6442, 149-167 (2010).

A privacy-aware protocol for sociometric questionnaires. (English) Zbl 1247.91167

Hlinený, Petr (ed.) et al., Annual doctoral workshop on mathematical and engineering methods in computer science (MEMICS’09). Selected papers based on the presentations at the workshop, November 13-15, 2009, Znojmo, Czech Republic. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-15-6). OASIcs – OpenAccess Series in Informatics 13, 1-9, electronic only (2009).
MSC:  91E45 05C90 68P25
Full Text: DOI

Impersonation attacks on a mobile security protocol for end-to-end communications. (English) Zbl 1184.68233

Schmidt, Andreas U. (ed.) et al., Security and privacy in mobile information and communication systems. First international ICST conference, MoboSec 2009, Turin, Italy, June 3–5, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04433-5/pbk; 978-3-642-04434-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 17, 278-287 (2009).
MSC:  68P25 94A60
Full Text: DOI

Towards an automatic analysis of web service security. (English) Zbl 1148.68315

Konev, Boris (ed.) et al., Frontiers of combining systems. 6th international symposium, FroCoS 2007, Liverpool, UK, September 10–12, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74620-1/pbk). Lecture Notes in Computer Science 4720. Lecture Notes in Artificial Intelligence, 133-147 (2007).
MSC:  68M10 68M12 68P25
Full Text: DOI

Relating two standard notions of secrecy. (English) Zbl 1247.94030

Autexier, Serge (ed.) et al., Workshop on trustworthy software. Selected papers based on the presentations at the workshop, May 18–19, 2006, Saarbrücken, Germany. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-02-6). OASIcs – OpenAccess Series in Informatics 3, 29 p., electronic only (2006).
MSC:  94A60 68P30
Full Text: DOI

Return address randomization scheme for annuling data-injection buffer overflow attacks. (English) Zbl 1172.68345

Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 238-252 (2006).
MSC:  68M12 68N30 68P25
Full Text: DOI

Packet marking based cooperative attack response service for effectively handling suspicious traffic. (English) Zbl 1172.68344

Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 182-195 (2006).
MSC:  68M12 68P25 94A62
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software