Sciweavers

2108 search results - page 318 / 422
» Encrypted
Sort
View
ISW
2009
Springer
15 years 9 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
SSD
2009
Springer
126views Database» more  SSD 2009»
15 years 9 months ago
A Location Privacy Aware Friend Locator
A location-based service called friend-locator notifies a user if the user is geographically close to any of the user’s friends. Services of this kind are getting increasingly p...
Laurynas Siksnys, Jeppe R. Thomsen, Simonas Salten...
TAMC
2009
Springer
15 years 9 months ago
Preserving Privacy versus Data Retention
The retention of communication data has recently attracted much public interest, mostly because of the possibility of its misuse. In this paper, we present protocols that address ...
Markus Hinkelmann, Andreas Jakoby
SOUPS
2009
ACM
15 years 8 months ago
Not one click for security?
: © Not One Click for Security Alan H. Karp, Marc Stiegler, Tyler Close HP Laboratories HPL-2009-53 Secure cooperation, usable security Conventional wisdom holds that security mus...
Alan H. Karp, Marc Stiegler, Tyler Close
235
Voted
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
15 years 8 months ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta