Sciweavers

392 search results - page 66 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
FC
2003
Springer
101views Cryptology» more  FC 2003»
14 years 3 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
CCS
2006
ACM
14 years 2 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
DAC
2003
ACM
14 years 11 months ago
Analog and RF circuit macromodels for system-level analysis
Design and validation of mixed-signal integrated systems require evel model abstractions. Generalized Volterra series based models have been successfully applied for analog and RF...
Xin Li, Peng Li, Yang Xu, Lawrence T. Pileggi
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
14 years 1 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
CSCW
2008
ACM
14 years 5 days ago
Family accounts: a new paradigm for user accounts within the home environment
In this paper we present Family Accounts, a new user account model for shared home computers. We conducted a study with sixteen families, eight who used individual profiles at hom...
Serge Egelman, A. J. Bernheim Brush, Kori M. Inkpe...