Sciweavers

2846 search results - page 24 / 570
» Not one click for security
Sort
View
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
EUROCRYPT
2000
Springer
15 years 7 months ago
One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval
We show that general one-way trapdoor permutations are sufficient to privately retrieve an entry from a database of size n with total communication complexity strictly less than n....
Eyal Kushilevitz, Rafail Ostrovsky
JCP
2008
87views more  JCP 2008»
15 years 3 months ago
VLSI Architecture of a Cellular Automata based One-Way Function
In this paper, a technique to generate expander graphs using Cellular Automata (CA) has been presented. The special class of CA, known as the Two Predecessor Single Attractor Cellu...
Debdeep Mukhopadhyay, Pallavi Joshi, Dipanwita Roy...
JDCTA
2008
160views more  JDCTA 2008»
15 years 3 months ago
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise
The Information Technology (IT) governance arrangements refer to the patterns of authority for key IT activities in organizations, including IT infrastructure, IT use, and project...
Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khod...
VL
2006
IEEE
125views Visual Languages» more  VL 2006»
15 years 10 months ago
Code Thumbnails: Using Spatial Memory to Navigate Source Code
Modern development environments provide many features for navigating source code, yet recent studies show the developers still spend a tremendous amount of time just navigating. S...
Robert DeLine, Mary Czerwinski, Brian Meyers, Gina...