Sciweavers

4 search results - page 1 / 1
» The Limits of Composable Crypto with Transferable Setup Devi...
Sort
View
CORR
2007
Springer
150views Education» more  CORR 2007»
13 years 4 months ago
Composable Security in the Bounded-Quantum-Storage Model
We give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Damg...
Stephanie Wehner, Jürg Wullschleger
SERP
2003
13 years 5 months ago
Memory Access Characteristics of Network Infrastructure Applications
Network infrastructure is composed of various devices located either in the core or at the edges of a wide-area network. These devices are required to deliver high transaction thr...
Abdul Waheed
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
ICRA
2007
IEEE
135views Robotics» more  ICRA 2007»
13 years 10 months ago
Robot-Dummy Crash Tests for Robot Safety Assessment
— New technologies and processes enhance the need for direct human-robot-interaction, to fully exploit the potential of robots’ accuracy and humans’ adaptability. Therefore, ...
Susanne Oberer, Rolf Dieter Schraft