Sciweavers

1612 search results - page 300 / 323
» About models of security protocols
Sort
View
NDSS
2003
IEEE
14 years 3 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesā€”the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
12 years 7 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
14 years 3 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same ļ¬ngerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
ASIACRYPT
2010
Springer
13 years 7 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
TSE
1998
116views more  TSE 1998»
13 years 9 months ago
A Framework-Based Approach to the Development of Network-Aware Applications
ā€” Modern networks provide a QoS (quality of service) model to go beyond best-effort services, but current QoS models are oriented towards low-level network parameters (e.g., band...
Jürg Bolliger, Thomas R. Gross