Sciweavers

1059 search results - page 200 / 212
» Modeling Security Protocols as Games
Sort
View
161
Voted
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
288
Voted

Lecture Notes
742views
17 years 1 months ago
Computer Systems Analysis
Comparing systems using measurement, simulation, and queueing models. Common mistakes and how to avoid them, selection of techniques and metrics, art of data presentation, summariz...
Raj Jain
119
Voted
ASIACRYPT
2009
Springer
15 years 10 months ago
Simple Adaptive Oblivious Transfer without Random Oracle
Adaptive oblivious transfer (adaptive OT) schemes have wide applications such as oblivious database searches, secure multiparty computation and etc. It is a two-party protocol whic...
Kaoru Kurosawa, Ryo Nojima
115
Voted
ICANN
2005
Springer
15 years 9 months ago
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Emilio Corchado, Álvaro Herrero, José...
116
Voted
ICDCIT
2005
Springer
15 years 9 months ago
Off-Line Micro-payment System for Content Sharing in P2P Networks
— Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-asyou-use services for a wide variety of web-based applications. We proposed a n...
Xiaoling Dai, John C. Grundy