Sciweavers

1834 search results - page 227 / 367
» Public Key Cryptography
Sort
View
119
Voted
SP
2002
IEEE
122views Security Privacy» more  SP 2002»
15 years 2 months ago
The UNICORE Grid infrastructure
UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to dif...
Mathilde Romberg
IPMU
2010
Springer
15 years 1 months ago
Arity-Monotonic Extended Aggregation Operators
A class of extended aggregation operators, called impact functions, is proposed and their basic properties are examined. Some important classes of functions like generalized ordere...
Marek Gagolewski, Przemyslaw Grzegorzewski
114
Voted
ICALP
2009
Springer
16 years 3 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
121
Voted
ASIACRYPT
2004
Springer
15 years 8 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
122
Voted
EUROCRYPT
2009
Springer
16 years 3 months ago
Smashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
Khaled Ouafi, Serge Vaudenay