Sciweavers

1898 search results - page 31 / 380
» Weak Keys for IDEA
Sort
View
96
Voted
INTERACT
2003
15 years 5 months ago
Key Functionalities of SAP Community
: The SAP Community is a platform for a true virtual community where people and companies come together to exchange ideas, solve problems, benefit from stimulating advice, and coll...
Raimund Mollenhauer
109
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
125
Voted
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 3 months ago
A Fast Semantically Secure Public Key Cryptosystem Based on Factoring
The cryptosystem proposed by Koyama is not semantically secure. Also, it is not secure against partial known plaintext attack, linearly related plaintext attack and low exponent a...
Sahadeo Padhye, Birendra Kumar Sharma
153
Voted
ICALP
1997
Springer
15 years 7 months ago
Recursive Computational Depth
In the 1980's, Bennett introduced computational depth as a formal measure of the amount of computational history that is evident in an object's structure. In particular,...
James I. Lathrop, Jack H. Lutz
149
Voted
SASN
2004
ACM
15 years 9 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...