In this paper we propose a new approach to privately compute the set-union cardinality and the set-intersection cardinality among multiple honest-but-curious parties. Our approach ...
Rolf Egert, Marc Fischlin, David Gens, Sven Jacob,...
Abstract. XACML has become the defacto standard for enterprisewide, policy-based access control. It is a structured, extensible language that can express and enforce complex access...
Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim
The Whirlwind hash function, which outputs a 512-bit digest, was designed by Barreto et al. and published by Design, Codes and Cryptography in 2010. In this paper, we provide a tho...
A 25-gigabyte “point obfuscation” challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation” is another name for passwor...
In cryptography, forward secrecy is a well-known property for key agreement protocols. It ensures that a session key will remain private even if one of the long-term secret keys is...
Detecting malicious attempts to access computers is difficult with current security applications. Many current applications do not give the user the right information to find and ...
Leliel Trethowen, Craig Anslow, Stuart Marshall, I...
Ring signature enables an user to anonymously sign a message on behalf of a group of users termed as ‘ring’ formed in an ‘ad-hoc’ manner. A naive scheme produces a signatur...
Priyanka Bose, Dipanjan Das 0002, Chandrasekaran P...
In this paper, the problem of speech source localization and separation from recordings of convolutive underdetermined mixtures is studied. The problem is cast as recovering the s...
In this paper, a compressive sensing (CS) perspective to exemplar-based speech processing is proposed. Relying on an analytical relationship between CS formulation and statistical...