搜索结果: 76-90 共查到“知识库 计算机工程”相关记录1101条 . 查询时间(1.75 秒)
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager is forced to carry ou...
FINDING COMPOSITE ORDER ORDINARY ELLIPTIC CURVES USING THE COCKS-PINCH METHOD
ORDER ORDINARY ELLIPTIC CURVES COCKS-PINCH METHOD
2015/8/5
We apply the Cocks-Pinch method to obtain pairing-friendly composite order groups with prescribed embedding degree associated to ordinary
elliptic curves, and we show that new security issues arise i...
XCS: cross channel scripting and its impact on web applications
web applications channel scripting
2015/8/5
We study the security of embedded web servers used in con- sumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access points and lights-out...
XCS: cross channel scripting and its impact on web applications
web applications channel scripting
2015/8/5
We study the security of embedded web servers used in con- sumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access points and lights-out...
Ensuring High-Quality Randomness in Cryptographic Key Generation
Cryptographic Key Generation High-Quality Randomness
2015/8/5
The security of any cryptosystem relies on the secrecy of the system's secret keys. Yet, recent experimental work demonstrates that tens of thousands of devices on the Internet use RSA and DSA secrets...
Private Database Queries Using Somewhat Homomorphic Encryption
Somewhat Homomorphic Encryption Database
2015/8/5
In a private database query system, a client issues queries to a database and obtains the results without learning anything else about the database and without the server learning the query. While pre...
While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as so...
The most dangerous code in the world: validating SSL certificates in non-browser software
non-browser software validating SSL
2015/8/5
SSL (Secure Sockets Layer) is the de facto standard for secure Internet communications. Security of SSL connections against an active network attacker depends on correctly validating public-key certif...
Who Killed My Battery: Analyzing Mobile Browser Energy Consumption
Energy Consumption Killed My Battery
2015/8/5
Despite the growing popularity of mobile web browsing, the energy consumed by a phone browser while surfing the web is poorly understood. We present an infrastructure for measuring the precise energy ...
SessionJuggler: Secure Web Login From an Untrusted Terminal Using Session Hijacking
Untrusted Terminal Secure Web Login From
2015/8/5
We use modern features of web browsers to develop a secure login system from an untrusted terminal. The system, called SessionJuggler, requires no server-side changes and no special software on the te...
Targeted malleability: homomorphic encryption for restricted computations
restricted computations homomorphic encryption
2015/8/5
We put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios we would like to restrict the homomorphic computations one can perform on encrypted data...
The Online Certificate Status Protocol (OCSP) is as good as dead. It imposes a massive performance penalty on web traffic and has failed to mitigate the recent high-profile certificate security breach...
The case for prefetching and prevalidating TLS server certificates
TLS server certificates prefetching
2015/8/5
A key bottleneck in a full TLS handshake is the need to fetch and validate the server certificate before a secure connection can be established. We propose a mechanism by which a browser can prefetch ...
The RSA cryptosystem, invented by Ron Rivest, Adi Shamir, and Len Adleman [21], was rst
publicized in the August 1977 issue of Scientic American. The cryptosystem is most commonly
used for providi...
A Survey of Two Signature Aggregation Techniques
Signature Aggregation Techniques signature scheme
2015/8/5
We survey two recent signature constructions that support signature aggregation: Given n signatures on n distinct messages from n distinct users, it is possible to aggregate all these signatures into ...