ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 3 Issue 3, Aug. 2000

Scalable multicast security with dynamic recipient groups
Refik Molva, Alain Pannetrat
Pages: 136-160
DOI: 10.1145/357830.357834
In this article we propose a new framework for multicast security based on distributed computation of security transforms by intermediate nodes. The involvement of intermediate nodes in the security process causes a new type of dependency...

Signature schemes based on the strong RSA assumption
Ronald Cramer, Victor Shoup
Pages: 161-185
DOI: 10.1145/357830.357847
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the signer to maintain any state, and can be proven secure against adaptive chosen message attack under a reasonable intractability...

The base-rate fallacy and the difficulty of intrusion detection
Stefan Axelsson
Pages: 186-205
DOI: 10.1145/357830.357849
Many different demands can be made of intrusion detection systems. An important requirement is that an intrusion detection system be effective; that is, it should detect a substantial percentage of intrusions into the supervised...