Sciweavers

1834 search results - page 305 / 367
» Public Key Cryptography
Sort
View
IEEESCC
2007
IEEE
14 years 2 months ago
Enabling User Control with Personal Identity Management
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
Ty Mey Eap, Marek Hatala, Dragan Gasevic
ASIACRYPT
2007
Springer
14 years 1 months ago
Two-Party Computing with Encrypted Data
We consider a new model for online secure computation on encrypted inputs in the presence of malicious adversaries. The inputs are independent of the circuit computed in the sense ...
Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malki...
BVAI
2007
Springer
14 years 1 months ago
Neural Object Recognition by Hierarchical Learning and Extraction of Essential Shapes
We present a hierarchical system for object recognition that models neural mechanisms of visual processing identified in the mammalian ventral stream. The system is composed of ne...
Daniel Oberhoff, Marina Kolesnik
CCS
2007
ACM
14 years 1 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
CCS
2007
ACM
14 years 1 months ago
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
We construct two new multiparty digital signature schemes that allow multiple signers to sequentially produce a compact, fixed-length signature. First, we introduce a new primiti...
Alexandra Boldyreva, Craig Gentry, Adam O'Neill, D...