Sciweavers

27 search results - page 4 / 6
» Private Information Retrieval in the Presence of Malicious F...
Sort
View
COMCOM
2010
148views more  COMCOM 2010»
13 years 4 months ago
Privacy versus scalability in radio frequency identification systems
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-o...
Basel Alomair, Radha Poovendran
CCS
2008
ACM
13 years 8 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
FOCS
2006
IEEE
14 years 1 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
13 years 10 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 7 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg