Sciweavers

1795 search results - page 311 / 359
» Security Models and Information Flow
Sort
View
120
Voted
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
112
Voted
IEEEARES
2009
IEEE
15 years 10 months ago
Measuring Voter-Controlled Privacy
—In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent ...
Hugo L. Jonker, Sjouke Mauw, Jun Pang
136
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System
Recommender systems enable merchants to assist customers in finding products that best satisfy their needs. Unfortunately, current recommender systems suffer from various privacy...
Esma Aïmeur, Gilles Brassard, José Man...
127
Voted
CSFW
2006
IEEE
15 years 9 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
119
Voted
NSPW
2006
ACM
15 years 9 months ago
PKI design for the real world
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
Peter Gutmann