Sciweavers

677 search results - page 94 / 136
» Secure Pseudonymous Channels
Sort
View
124
Voted
AFRICACRYPT
2009
Springer
15 years 7 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
16 years 4 months ago
An Efficient Method for Random Delay Generation in Embedded Software
Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of rando...
Ilya Kizhvatov, Jean-Sébastien Coron
130
Voted
ICALP
2007
Springer
15 years 9 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
125
Voted
ICCS
2005
Springer
15 years 9 months ago
ACCESS: An Agent Based Architecture for the Rapid Prototyping of Location Aware Services
We describe the Agents Channelling ContExt Sensitive Services (ACCESS) architecture, an open agent-based architecture that supports the development and deployment of multiple heter...
Robin Strahan, Gregory M. P. O'Hare, Conor Muldoon...
98
Voted
ISCC
2003
IEEE
101views Communications» more  ISCC 2003»
15 years 9 months ago
A New Self-Healing Key Distribution Scheme
A self-healing key distributionscheme enables a group of users to establish a group key over an unreliable channel. In such a protocol, a group manager, to distributea session key...
Carlo Blundo, Paolo D'Arco, Massimiliano Listo