搜索结果: 1-15 共查到“军事学 Web”相关记录25条 . 查询时间(0.046 秒)
复旦大学计算机科学与技术学院信息安全课件 Web & EC Security
复旦大学计算机科学与技术学院 信息安全 课件 Web & EC Security
font style='font-size:12px;'>
2018/7/20
复旦大学计算机科学与技术学院信息安全课件 Web & EC Security。
Outsourcing Modular Exponentiation in Cryptographic Web Applications
Internet voting Modular exponentiations JavaScript cryptography
font style='font-size:12px;'>
2018/4/3
Modern web applications using advanced cryptographic methods may need to calculate a large number of modular exponentiations. Performing such calculations in the web browser efficiently is a known pro...
Evaluating web PKIs
PKI severely broken
font style='font-size:12px;'>
2017/6/6
Certificate authorities serve as trusted parties to help secure web communications. They are a vital component for ensuring the security of cloud infrastructures and big data repositories. Unfortunate...
Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy
two-factor authentication unlinkability
font style='font-size:12px;'>
2017/2/23
This work introduces PassPhone, a new smartphone-based authentication scheme that outsources user verification to a trusted third party without sacrificing privacy: neither can the trusted third party...
Blind Web Search: How far are we from a privacy preserving search engine?
fully homomorphic encryption privacy preserving applications encrypted web search
font style='font-size:12px;'>
2016/12/10
Recent rapid progress in fully homomorphic encryption (FHE) and somewhat homomorphic encryption
(SHE) has catalyzed renewed efforts to develop efficient privacy preserving protocols. Several works
h...
Building web applications on top of encrypted data using Mylar
web security end-to-end encryption
font style='font-size:12px;'>
2016/12/9
Web applications rely on servers to store and process confidential information. However, anyone who gains access to the server (e.g., an attacker, a curious administrator, or a government) can obtain ...
Quantifying Web Adblocker Privacy
web privacy adblocker quantification
font style='font-size:12px;'>
2016/12/9
Web advertisements, an integral part of today's web browsing experience, financially support countless websites. Meaningful advertisements, however, require behavioral targeting, user tracking and pro...
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Web PKI SSL/TLS man-in-the-middle attack
font style='font-size:12px;'>
2016/2/23
. SSL/TLS is the de facto protocol for providing secure communication
over the Internet. It relies on the Web PKI model for authentication
and secure key exchange. Despite its relatively successful ...
Private Web Search with Constant Round Efficiency
Private web search (PWS) Secret sharing Public-key encryption
font style='font-size:12px;'>
2016/1/8
Web search is increasingly becoming an essential activity as it is frequently
the most effective and convenient way of finding information. However, it can be a threat
for the privacy of users becau...
Secure modular password authentication for the web using channel bindings
password authentication Transport Layer Security channel binding
font style='font-size:12px;'>
2016/1/7
Secure protocols for password-based user authentication are well-studied in the cryptographic
literature but have failed to see wide-spread adoption on the Internet; most proposals to date
require e...
Web Tap Payment Authentication and Encryption With Zero Customer Effort
Public-Key Cryptography Digital Signatures Applications
font style='font-size:12px;'>
2016/1/6
We propose a public-key authentication and encryption application
that secures the messages between Tap-Card-Pay application,
Tap-Card-Pay Systems Corporation, customers, and merchants allowing
the...
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
Side-channel leak web application suggest box
font style='font-size:12px;'>
2016/1/5
Web applications are subject to several types of attacks. In
particular, side-channel attacks consist in performing a statistical analysis
of the web traffic to gain sensitive information about a cl...
On the Difficulty of Securing Web Applications using CryptDB
CryptDB database integrity query integrity
font style='font-size:12px;'>
2016/1/4
CryptDB has been proposed as a practical and secure middleware to protect databases deployed on semi-honest cloud servers. While CryptDB provides sufficient protection under Threat-1, here we demonstr...
A Note on the Lindell-Waisbard Private Web Search Scheme
Private web search private shuffle ElGamal encryption
font style='font-size:12px;'>
2015/12/31
In 2010, Lindell and Waisbard proposed a private web search scheme
for malicious adversaries. At the end of the scheme, each party obtains one search
word and query the search engine with the word. ...
Method to Protect Passwords in Databases for Web Applications
authentication passwords
font style='font-size:12px;'>
2015/12/31
Trying to make it more difficult to hack passwords has a long history. However the research community has not addressed the change of context from traditional Unix mainframe systems to web application...