Sciweavers

222 search results - page 8 / 45
» di 2010
Sort
View
COMPSEC
2010
98views more  COMPSEC 2010»
13 years 8 months ago
Managing key hierarchies for access control enforcement: Heuristic approaches
Carlo Blundo, Stelvio Cimato, Sabrina De Capitani ...
PAIRING
2010
Springer
116views Cryptology» more  PAIRING 2010»
13 years 6 months ago
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the s...
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
IPPS
2010
IEEE
13 years 6 months ago
Efficient lists intersection by CPU-GPU cooperative computing
Di Wu, Fan Zhang, Naiyong Ao, Gang Wang, Xiaoguang...
EVOW
2010
Springer
13 years 11 months ago
Exploiting Evolution for an Adaptive Drift-Robust Classifier in Chemical Sensing
Stefano Di Carlo, Matteo Falasconi, Ernesto S&aacu...
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
13 years 9 months ago
When Failure Analysis Meets Side-Channel Attacks
Jerome Di-Battista, Jean-Christophe Courrèg...