Sciweavers

905 search results - page 24 / 181
» The Case Against Micropayments
Sort
View
ICUMT
2009
13 years 5 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio
ACRI
2010
Springer
13 years 4 months ago
Using Cellular Automata on a Graph to Model the Exchanges of Cash and Goods
This paper investigates the behaviors and the properties of a "Give and Take" cellular automaton on a graph. Using an economical metaphor, this model implements the excha...
Ranaivo Mahaleo Razakanirina, Bastien Chopard
CRYPTO
2012
Springer
262views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Functional Encryption with Bounded Collusions via Multi-party Computation
We construct a functional encryption scheme secure against an a-priori bounded polynomial number of collusions for the class of all polynomial-size circuits. Our constructions req...
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 8 months ago
Doubly Perfect Nonlinear Boolean Permutations
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secretkey block ciphers. This choice directly induces the cl...
Laurent Poinsot
CRYPTO
2004
Springer
119views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Security of Random Feistel Schemes with 5 or More Rounds
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Jacques Patarin