scispace - formally typeset
BookDOI

Computer Security — ESORICS 98

Reads0
Chats0
About
The article was published on 1998-01-01. It has received 71 citations till now. The article focuses on the topics: Computer security model & Security analysis.

read more

Citations
More filters
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Book ChapterDOI

A Leakage-Resilient Mode of Operation

TL;DR: It is shown that unlike "normal" PRFs, wPRFs are seed-incompressible, in the sense that the output of a wPRF is pseudorandom even if a bounded amount of information about the key is leaked.
Book ChapterDOI

Intrusion Detection Using Variable-Length Audit Trail Patterns

TL;DR: This paper presents a novel technique to build a table of variable-length patterns based on Teiresias, an algorithm initially developed for discovering rigid patterns in unaligned biological sequences, and evaluates the quality of the technique in a testbed environment, and compares it with the intrusion-detection system proposed by Forrest et al.
Book ChapterDOI

A Distributed Light-Weight Authentication Model for Ad-hoc Networks

TL;DR: This work presents a security model for low-value transactions in ad-hoc networks in which this is the core requirement for commercial transactions and is based on a recommendation and reference protocol that is inspired by human behavior and that is in accordance with the very nature of ad-Hoc networks.
Book ChapterDOI

The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme

TL;DR: A new class of RSA-related computational problems which are called the "one-more-RSA-inversion" problems, which have polynomially-equivalent computational complexity and lead to a proof of security for Chaum's scheme in the random oracle model based on the assumed hardness of either of these problems.