Sciweavers

515 search results - page 72 / 103
» Secure Parameters for SWIFFT
Sort
View
DSN
2007
IEEE
14 years 3 months ago
On a Modeling Framework for the Analysis of Interdependencies in Electric Power Systems
Nowadays, economy, security and quality of life heavily depend on the resiliency of a number of critical infrastructures, including the Electric Power System (EPS), through which ...
Silvano Chiaradonna, Paolo Lollini, Felicita Di Gi...
INFOCOM
2007
IEEE
14 years 3 months ago
A Proxy View of Quality of Domain Name Service
— The Domain Name System (DNS) provides a critical service for the Internet – mapping of user-friendly domain names to their respective IP addresses. Yet, there is no standard ...
Lihua Yuan, Krishna Kant, Prasant Mohapatra, Chen-...
EPEW
2007
Springer
14 years 3 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan