Sciweavers

146 search results - page 16 / 30
» Private Quantum Channels
Sort
View
FOCS
2006
IEEE
14 years 2 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
IEEEIAS
2008
IEEE
14 years 2 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
TIT
1998
127views more  TIT 1998»
13 years 7 months ago
The Art of Signaling: Fifty Years of Coding Theory
—In 1948 Shannon developed fundamental limits on the efficiency of communication over noisy channels. The coding theorem asserts that there are block codes with code rates arbit...
A. Robert Calderbank
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 1 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
WSKS
2009
Springer
14 years 2 months ago
Improving Access to Services through Intelligent Contents Adaptation: The SAPI Framework
Nowadays, every public or private company has to provide the access to their services through Internet. Unfortunately, the access channels and devices increase both in numbers and ...
Nicola Capuano, Gaetano Rocco De Maio, Pierluigi R...