搜索结果: 1-15 共查到“军事学 Web 2.0”相关记录25条 . 查询时间(0.062 秒)
复旦大学计算机科学与技术学院信息安全课件 Web & EC Security。
Outsourcing Modular Exponentiation in Cryptographic Web Applications
Internet voting Modular exponentiations JavaScript cryptography
2018/4/3
Modern web applications using advanced cryptographic methods may need to calculate a large number of modular exponentiations. Performing such calculations in the web browser efficiently is a known pro...
Evaluating web PKIs
PKI severely broken
2017/6/6
Certificate authorities serve as trusted parties to help secure web communications. They are a vital component for ensuring the security of cloud infrastructures and big data repositories. Unfortunate...
Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy
two-factor authentication unlinkability
2017/2/23
This work introduces PassPhone, a new smartphone-based authentication scheme that outsources user verification to a trusted third party without sacrificing privacy: neither can the trusted third party...
Blind Web Search: How far are we from a privacy preserving search engine?
fully homomorphic encryption privacy preserving applications encrypted web search
2016/12/10
Recent rapid progress in fully homomorphic encryption (FHE) and somewhat homomorphic encryption
(SHE) has catalyzed renewed efforts to develop efficient privacy preserving protocols. Several works
h...
Building web applications on top of encrypted data using Mylar
web security end-to-end encryption
2016/12/9
Web applications rely on servers to store and process confidential information. However, anyone who gains access to the server (e.g., an attacker, a curious administrator, or a government) can obtain ...
Web advertisements, an integral part of today's web browsing experience, financially support countless websites. Meaningful advertisements, however, require behavioral targeting, user tracking and pro...
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Web PKI SSL/TLS man-in-the-middle attack
2016/2/23
. SSL/TLS is the de facto protocol for providing secure communication
over the Internet. It relies on the Web PKI model for authentication
and secure key exchange. Despite its relatively successful ...
Private Web Search with Constant Round Efficiency
Private web search (PWS) Secret sharing Public-key encryption
2016/1/8
Web search is increasingly becoming an essential activity as it is frequently
the most effective and convenient way of finding information. However, it can be a threat
for the privacy of users becau...
Secure modular password authentication for the web using channel bindings
password authentication Transport Layer Security channel binding
2016/1/7
Secure protocols for password-based user authentication are well-studied in the cryptographic
literature but have failed to see wide-spread adoption on the Internet; most proposals to date
require e...
Web Tap Payment Authentication and Encryption With Zero Customer Effort
Public-Key Cryptography Digital Signatures Applications
2016/1/6
We propose a public-key authentication and encryption application
that secures the messages between Tap-Card-Pay application,
Tap-Card-Pay Systems Corporation, customers, and merchants allowing
the...
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
Side-channel leak web application suggest box
2016/1/5
Web applications are subject to several types of attacks. In
particular, side-channel attacks consist in performing a statistical analysis
of the web traffic to gain sensitive information about a cl...
On the Difficulty of Securing Web Applications using CryptDB
CryptDB database integrity query integrity
2016/1/4
CryptDB has been proposed as a practical and secure middleware to protect databases deployed on semi-honest cloud servers. While CryptDB provides sufficient protection under Threat-1, here we demonstr...
A Note on the Lindell-Waisbard Private Web Search Scheme
Private web search private shuffle ElGamal encryption
2015/12/31
In 2010, Lindell and Waisbard proposed a private web search scheme
for malicious adversaries. At the end of the scheme, each party obtains one search
word and query the search engine with the word. ...
Trying to make it more difficult to hack passwords has a long history. However the research community has not addressed the change of context from traditional Unix mainframe systems to web application...