Sciweavers

95 search results - page 17 / 19
» Bounded CCA2-Secure Encryption
Sort
View
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
14 years 7 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein
TCC
2010
Springer
179views Cryptology» more  TCC 2010»
14 years 3 months ago
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs
A family of trapdoor functions is one-way under correlated inputs if no efficient adversary can invert it even when given the value of the function on multiple correlated inputs. T...
Yevgeniy Vahlis
MDM
2007
Springer
111views Communications» more  MDM 2007»
14 years 25 days ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
14 years 19 days ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
CSFW
2007
IEEE
13 years 10 months ago
A Type Discipline for Authorization in Distributed Systems
We consider the problem of statically verifying the conformance of the code of a system to an explicit authorization policy. In a distributed setting, some part of the system may ...
Cédric Fournet, Andy Gordon, Sergio Maffeis