Sciweavers

1064 search results - page 177 / 213
» Cryptography from Anonymity
Sort
View
CCS
2010
ACM
13 years 8 months ago
TAPS: automatically preparing safe SQL queries
We present the first sound program transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 7 months ago
Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding
: We develop a framework for solving polynomial equations with size constraints on solutions. We obtain our results by showing how to apply a technique of Coppersmith for finding ...
Henry Cohn, Nadia Heninger
INFOCOM
2010
IEEE
13 years 7 months ago
Channel-based Unidirectional Stream Protocol (CUSP)
—This paper presents a novel transport protocol, CUSP, specifically designed with complex and dynamic network applications in mind. Peer-to-peer applications benefit in particu...
Wesley W. Terpstra, Christof Leng, Max Lehn, Aleja...
GLOBECOM
2010
IEEE
13 years 7 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
USS
2010
13 years 7 months ago
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash
In recent years, many advances have been made in cryptography, as well as in the performance of communication networks and processors. As a result, many advanced cryptographic pro...
Sarah Meiklejohn, C. Christopher Erway, Alptekin K...