Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Paterson, Kenneth G. Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  Coming of age: a longitudinal study of TLS deployment
Kotzias P., Razaghpanah A., Amann J., Paterson K., Vallina-Rodriguez N., Caballero J.  IMC 2018 (Proceedings of the 2018 Internet Measurement Conference, Boston, MA, Oct 31-Nov 2, 2018) 415-428, 2018.  Type: Proceedings

The paper presents a longitudinal study of secure sockets layer/transport layer security (SSL/TLS) deployment. The datasets span periods from early 2012 and mid-2015 until now, and contain the TLS parameters used for negotiations as we...
...
Jan 28 2019  
  RKA security beyond the linear barrier: IBE, encryption and signatures
Bellare M., Paterson K., Thomson S.  ASIACRYPT 2012 (Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, Dec 2-6, 2012) 331-348, 2012.  Type: Proceedings

This paper presents a framework that enables the construction of identity-based encryptions (IBEs) that are secure from related-key attacks (RKAs)....
...
Jun 20 2013  
  Lost in translation: theory and practice in cryptography
Paterson K., Yau A. IEEE Security and Privacy 4(3): 69-72, 2006.  Type: Article

Paterson and Yau have written an extremely concise and to-the-point article, using a case study to highlight some important lessons in cryptography. They remember Bellovin’s first warning on the hidden dangers of unauthentica...
...
Nov 2 2006  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy