6th ACM Conference on Computer and Communications Security: November 2-4, 1999, Kent Ridge Digital Labs, Singapore, Volume 6 |
Contents
A HighPerformance Network Intrusion Detection System | 8 |
A Fuzzy Commitment Scheme | 28 |
Guillaume Poupard Jacques Stern École Normale Supérieure France | 46 |
Copyright | |
6 other sections not shown
Common terms and phrases
adversary algorithm Alice applications approach assume attack authentication protocol basic biometric bits certificate chooses chosen codeword collision resistant commitment scheme compute construction Crypto cryptographic Cryptology cryptosystem decryption define definition denote described device digital signatures discrete logarithms efficient error-correcting codes escrow factor framework fuzzy commitment hardened password hash function hpwd IEEE implementation input integer intrusion detection system k-time key distribution key transport keystroke leaf lemma LNCS login program mod q modulo multicast node compromise one-way one-way function operation oracle output packet party polynomial prime proactive security probability Proc proof provably secure prove public key random random oracle model read foo requires result safe primes secret key secret sharing Section semantically secure sends sequence server signature scheme signed simulator smartcard string subset techniques Theorem tion tree user's verifiable encryption