Search
for Author
All Reviews
Reiter, Michael K.
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
9
reviews
Cross-VM side channels and their use to extract private keys
Zhang Y., Juels A., Reiter M., Ristenpart T. CCS 2012 (Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, Oct 16-18, 2012) 305-316, 2012. Type: Proceedings
The discovery of a high-impact side-channel attack is bad news for vulnerable systems, as it affects their design in an unexpected way. Side channel-attacks have been studied for virtual machines with very limited success up to now. Co...
...
Feb 8 2013
Towards practical biometric key generation with randomized biometric templates
Ballard L., Kamara S., Monrose F., Reiter M. CCS 2008 (Proceedings of the 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, Oct 27-31, 2008) 235-244, 2008. Type: Proceedings
The issue of generating strong cryptographic keys from the biometric features of individuals is addressed in this paper. It proposes an original scheme that overcomes some of the limitations of other approaches. The main advantages of ...
...
Jun 9 2009
The practical subtleties of biometric key generation
Ballard L., Kamara S., Reiter M. SS 2008 (Proceedings of the 17th Security Symposium, San Jose, CA, Jul 28-Aug 1, 2008) 61-74, 2008. Type: Proceedings
A biometric key generation system is a system where a biometric--for example, a fingerprint or an iris code--is coded and stored as a template, at an enrollment stage. When a user presents himself again, the biometric...
...
Mar 18 2009
An authorization model for a public key management service
Samarati P., Reiter M., Jajodia S. ACM Transactions on Information and System Security 4(4): 453-482, 2001. Type: Article
One basic requirement of key-based security systems is the ability to control access to both public and private keys. The authors present a powerful yet flexible authorization model for controlling access to public and private keys hel...
...
May 22 2002
Authentication metric analysis and design
Reiter M., Stubblebine S. ACM Transactions on Information and System Security 2(2): 138-158, 1999. Type: Article
This paper addresses the issue of determining the owner of a public key or, on the other hand, determining a user’s public key in order to encrypt data for secure transmission. In most real-life situations that involve differ...
...
Nov 1 1999
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy