Sciweavers

239 search results - page 8 / 48
» Proof Techniques for Cryptographic Processes
Sort
View
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
14 years 15 days ago
On Related-Secret Pseudorandomness
Related-key attacks are attacks against constructions which use a secret key (such as a blockcipher) in which an attacker attempts to exploit known or chosen relationships among ke...
David Goldenberg, Moses Liskov
ICASSP
2011
IEEE
13 years 8 days ago
Efficiently computing private recommendations
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused ...
Zekeriya Erkin, M. Beye, T. Veugen, Reginald L. La...
ICCSA
2007
Springer
14 years 2 months ago
Provably Secure Framework for Information Aggregation in Sensor Networks
Information aggregation is an important operation in wireless sensor networks executed for the purpose of monitoring and reporting of the environmental data. Due to the performance...
Mark Manulis, Jörg Schwenk
BIRTHDAY
2005
Springer
14 years 2 months ago
Natural Language Proof Explanation
Abstract. State-of-the-art proof presentation systems suffer from several deficiencies. First, they simply present the proofs without motivating why the proof is done as it is do...
Armin Fiedler
ACSAC
2006
IEEE
14 years 2 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten