Sciweavers

1005 search results - page 25 / 201
» Practical Secure Function Evaluation
Sort
View
HASE
2008
IEEE
13 years 8 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 2 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
WEA
2005
Springer
138views Algorithms» more  WEA 2005»
14 years 1 months ago
A Practical Minimal Perfect Hashing Method
We propose a novel algorithm based on random graphs to construct minimal perfect hash functions h. For a set of n keys, our algorithm outputs h in expected time O(n). The evaluatio...
Fabiano C. Botelho, Yoshiharu Kohayakawa, Nivio Zi...
CSI
2007
54views more  CSI 2007»
13 years 7 months ago
A practical verifiable multi-secret sharing scheme
C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483–490] proposed...
Jian-jie Zhao, Jianzhong Zhang 0005, Rong Zhao
EUROCRYPT
2009
Springer
14 years 8 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...