Sciweavers

59 search results - page 11 / 12
» Unrestricted Aggregate Signatures
Sort
View
IACR
2011
101views more  IACR 2011»
12 years 10 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
NAR
2011
234views Computer Vision» more  NAR 2011»
13 years 1 months ago
The UCSC cancer genomics browser: update 2011
The UCSC Cancer Genomics Browser (https:// genome-cancer.ucsc.edu) comprises a suite of web-based tools to integrate, visualize and analyze cancer genomics and clinical data. The ...
J. Zachary Sanborn, Stephen C. Benz, Brian Craft, ...
INFOCOM
2009
IEEE
14 years 5 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 5 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
CCS
2008
ACM
14 years 26 days ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...