Sciweavers

981 search results - page 62 / 197
» Advanced Encryption Standard
Sort
View
IADIS
2003
13 years 10 months ago
E-Technology V E-Law: Legal Challenges to the Information Society
In the area of electronic and mobile commerce there are unique legal risks as well as concerns that apply to traditional businesses. Various laws have been successfully applied to...
Elaine Lawrence, Gordana Culjak, John Lawrence
INFORMATICALT
2000
81views more  INFORMATICALT 2000»
13 years 8 months ago
A New Redundancy Reducing Cipher
This paper discusses a known-plaintext attack on a redundancy reducing cipher method which is proposed by Wayner. We also propose an extension of Wayner's redundancy reducing ...
Min-Shiang Hwang
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
14 years 1 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
14 years 24 days ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
KDD
2006
ACM
181views Data Mining» more  KDD 2006»
14 years 9 months ago
Cryptographically private support vector machines
We study the problem of private classification using kernel methods. More specifically, we propose private protocols implementing the Kernel Adatron and Kernel Perceptron learning ...
Helger Lipmaa, Sven Laur, Taneli Mielikäinen