ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 8 Issue 3, August 2005

APSS: proactive secret sharing in asynchronous systems
Lidong Zhou, Fred B. Schneider, Robbert Van Renesse
Pages: 259-286
DOI: 10.1145/1085126.1085127
APSS, a proactive secret sharing (PSS) protocol for asynchronous systems, is explained and proved correct. The protocol enables a set of secret shares to be periodically refreshed with a new, independent set, thereby thwarting mobile-adversary...

The concept of layered proving trees and its application to the automation of security protocol verification
Reiner Dojen, Tom Coffey
Pages: 287-311
DOI: 10.1145/1085126.1085128
Security protocols are one of the most critical elements in enabling the secure communication and processing of information. The presence of flaws in published protocols highlights the complexity of security protocol design. Only formal verification...

Keystroke analysis of free text
Daniele Gunetti, Claudia Picardi
Pages: 312-347
DOI: 10.1145/1085126.1085129
Keystroke dynamics can be useful to ascertain personal identity even after an authentication phase has been passed, provided that we are able to deal with the typing rhythms of free text, chosen and entered by users without any specific...