scientific article

From MaRDI portal
Publication:3691050

zbMath0573.68001MaRDI QIDQ3691050

Dorothy E. Denning

Publication date: 1982


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Secrecy types for asymmetric communication.Evaluation of eavesdropping error-rates in higher-dimensional QKD system implemented using dynamic spatial modesThe design of dynamic access control scheme with user authenticationA conference key distribution system based on cross-productGenerating quasi-random sequences from semi-random sourcesStream cipher encryption of random access filesComparison of perfect table cryptanalytic tradeoff algorithmsSolving the Running Key Cipher with the Viterbi AlgorithmSome democratic secret sharing schemesLinear-time optimal augmentation for componentwise bipartite-completeness of graphsAutomation of Quantitative Information-Flow AnalysisImage processing based techniques for securing documentsA password authentication scheme based on discrete logarithmsControlled query evaluation with open queries for a decidable relational submodelPassword authentications using triangles and straight linesCiphertext-only attack on \(d\times d\) Hill in \(O(d 13^d)\)Analysis of Rainbow Tables with FingerprintsUpper bound on the communication complexity of private information retrievalО среднем значении суммарной длины цепочек, вычисляемых при дополнительных проверках в методе балансировки с особыми точкамиA formal analysis of information disclosure in data exchangeA comparison of cryptanalytic tradeoff algorithmsAn equational logic based approach to the security problem against inference attacks on object-oriented databasesQuantifying Privacy: A Novel Entropy-Based Measure of Disclosure RiskAn analysis of chain characteristics in the cryptanalytic TMTO methodCryptologists should not ignore the history of Al-AndalusiaA memory-related vulnerability detection approach based on vulnerability model with Petri NetOn inference control in semantic data models for statistical databasesAn efficient probabilistic encryption schemeArithmetic operations on encrypted dataA fast software one-way hash functionBroadcasting cryptosystem in computer networksTyping access control and secure information flow in sessionsA logical framework for privacy-preserving social network publicationA logical approach to multilevel security of probabilistic systemsQuantitative information flow as safety and liveness hyperpropertiesDetermining periodicity: a case study of a functional specificationCryptographic relational algebra for databases using the field authenticatorRead-abortion (RA) based synchronization protocols to prevent illegal information flowSliding encryption: A cryptographic tool for mobile agentsCryptanalysis of a public key system based on Diophantine equationsAn ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key SystemOn the security of image encryption methodNondegenerate functions and permutationsProtocols for group oriented secret sharingAttacks on Okamoto and Tanaka's one-way ID-based key distribution systemQuantification of integrityA sound and complete model-generation procedure for consistent and confidentiality-preserving databasesSuccess probability of the Hellman trade-offTwo phases encryption and its applicationsA new password authentication mechanism based on two phases encryptionA novel access control method using Morton number and prime factorizationCryptanalysis of Liaw's broadcasting cryptosystemA novel image-hiding scheme based on block differenceOn the security of individual dataChecking inference-proofness of attribute-disjoint and duplicate-preserving fragmentationsTime–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPUUnauthorized inferences in semistructured databasesOnline data storage using implicit securityOn the Foundations of Quantitative Information FlowInformation loss in three cell-level control techniques for summary tablesA perfect threshold secret sharing scheme to identify cheatersИсследование сложности метода радужных таблиц с маркерами цепочекPassword authentication using public-key cryptographyОб одном теоретико-вероятностном подходе к обоснованию надежности метода ХеллманаOn the concealability of messages by the Williams public-key encryption schemeAnalysis of the Parallel Distinguished Point TradeoffThreshold verification scheme to a valid-signature using identity only on specialized approvalA combinatorial problem in database securityAnalysis of the perfect table fuzzy rainbow tradeoffStatic analysis for the \(\pi\)-calculus with applications to securityUsing smart cards to authenticate remote passwordsAccess control in a hierarchy using a one-way trap door functionAccess Control in a Core Calculus of DependencyLimits of the Cryptographic Realization of Dolev-Yao-Style XORQuantifying Probabilistic Information Flow in Computational Reactive SystemsSome variants of the take-grant protection modelScheme for secure digital mobile communications based on symmetric key cryptographyA new NTRU cryptosystem outperforms three highly secured NTRU-analog systems through an innovational algebraic structureAnalytical Characteristics of the DESOn the Security of Compressed EncodingsField Encryption and AuthenticationCryptanalysis of YCN key assignment scheme in a hierarchyAn authentication-combined access control scheme using a one-way functionConfidentiality Policies and Their Enforcement for Controlled Query EvaluationCardinality-Based Inference Control in Sum-Only Data Cubes