Sciweavers

132 search results - page 17 / 27
» Joint security
Sort
View
PET
2009
Springer
14 years 2 months ago
Privacy-Preserving Face Recognition
Abstract. Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, i...
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stef...
CSFW
2010
IEEE
13 years 11 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
CRITIS
2007
13 years 9 months ago
ICT Vulnerabilities of the Power Grid: Towards a Road Map for Future Research
The transformation of the European infrastructure creates considerable system security challenges. GRID is a joint effort of six European research organizations to achieve consensu...
Alberto Stefanini, Gerard Doorman, Nouredine Hadjs...
CSFW
2000
IEEE
13 years 12 months ago
Protocol Independence through Disjoint Encryption
One protocol (called the primary protocol) is independent of other protocols (jointly called the secondary protocol) if the question whether the primary protocol achieves a securi...
Joshua D. Guttman, F. Javier Thayer
FC
2001
Springer
125views Cryptology» more  FC 2001»
13 years 12 months ago
(M+1)st-Price Auction Protocol
Abstract. This paper presents a new protocol for M + 1st-price auction, a style of auction in which the highest M bidders win and pay a uniform price, determined by the (M + 1)st p...
Hiroaki Kikuchi