Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Reiter, Michael K. Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 9 reviews    
  Cross-VM side channels and their use to extract private keys
Zhang Y., Juels A., Reiter M., Ristenpart T.  CCS 2012 (Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, Oct 16-18, 2012) 305-316, 2012.  Type: Proceedings

The discovery of a high-impact side-channel attack is bad news for vulnerable systems, as it affects their design in an unexpected way. Side channel-attacks have been studied for virtual machines with very limited success up to now. Co...
...
Feb 8 2013  
  Towards practical biometric key generation with randomized biometric templates
Ballard L., Kamara S., Monrose F., Reiter M.  CCS 2008 (Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, Oct 27-31, 2008) 235-244, 2008.  Type: Proceedings

The issue of generating strong cryptographic keys from the biometric features of individuals is addressed in this paper. It proposes an original scheme that overcomes some of the limitations of other approaches. The main advantages of ...
...
Jun 9 2009  
  The practical subtleties of biometric key generation
Ballard L., Kamara S., Reiter M.  SS 2008 (Proceedings of the 17th Security Symposium, San Jose, CA, Jul 28-Aug 1, 2008) 61-74, 2008.  Type: Proceedings

A biometric key generation system is a system where a biometric--for example, a fingerprint or an iris code--is coded and stored as a template, at an enrollment stage. When a user presents himself again, the biometric...
...
Mar 18 2009  
  An authorization model for a public key management service
Samarati P., Reiter M., Jajodia S. ACM Transactions on Information and System Security 4(4): 453-482, 2001.  Type: Article

One basic requirement of key-based security systems is the ability to control access to both public and private keys. The authors present a powerful yet flexible authorization model for controlling access to public and private keys hel...
...
May 22 2002  
  Authentication metric analysis and design
Reiter M., Stubblebine S. ACM Transactions on Information and System Security 2(2): 138-158, 1999.  Type: Article

This paper addresses the issue of determining the owner of a public key or, on the other hand, determining a user’s public key in order to encrypt data for secure transmission. In most real-life situations that involve differ...
...
Nov 1 1999  

 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy