Sciweavers

349 search results - page 42 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
ISJGP
2010
13 years 5 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
12 years 8 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
ESORICS
2009
Springer
14 years 3 months ago
A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search
For nearest neighbor search, a user queries a server for nearby points of interest (POIs) with his/her location information. Our aim is to protect the user’s sensitive informatio...
Hyoungshick Kim
AGENTS
1997
Springer
14 years 24 days ago
COLLAGEN: When Agents Collaborate with People
We take the position that autonomous agents, when they interact with people, should be governed by the same principles that underlie human collaboration. These principles come fro...
Charles Rich, Candace L. Sidner
WMASH
2005
ACM
14 years 2 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina