Sciweavers

Share
CANS
2015
Springer
27views Cryptology» more  CANS 2015»
10 months 11 days ago
PUDA - Privacy and Unforgeability for Data Aggregation
Existing work on data collection and analysis for aggregation is mainly focused on confidentiality issues. That is, the untrusted Aggregator learns only the aggregation result wit...
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek &Oum...
CANS
2015
Springer
21views Cryptology» more  CANS 2015»
10 months 11 days ago
On the Weaknesses of PBKDF2
Andrea Visconti, Simone Bossi, Hany Ragab, Alexand...
CANS
2015
Springer
31views Cryptology» more  CANS 2015»
10 months 11 days ago
Security of Linear Secret-Sharing Schemes Against Mass Surveillance
Abstract Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and investigate the resistance of linear secret-sharing schemes to mass survei...
Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranel...
CANS
2015
Springer
34views Cryptology» more  CANS 2015»
10 months 11 days ago
Bandwidth-Optimized Secure Two-Party Computation of Minima
Secure Two-Party Computation (STC) allows two mutually untrusting parties to securely evaluate a function on their private inputs. While tremendous progress has been made towards r...
Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, ...
CANS
2015
Springer
23views Cryptology» more  CANS 2015»
10 months 11 days ago
Secure Set-Based Policy Checking and Its Application to Password Registration
Policies are the corner stones of today’s computer systems. They define secure states and safe operations. A common problem with policies is that their enforcement is often in c...
Changyu Dong, Franziskus Kiefer
CANS
2015
Springer
26views Cryptology» more  CANS 2015»
10 months 11 days ago
Outsourcing Secure Two-Party Computation as a Black Box
Secure multiparty computation (SMC) offers a technique to preserve functionality and data privacy in mobile applications. Current protocols that make this costly cryptographic con...
Henry Carter, Benjamin Mood, Patrick Traynor, Kevi...
CANS
2015
Springer
30views Cryptology» more  CANS 2015»
10 months 11 days ago
Privacy-Aware Authentication in the Internet of Things
Besides the opportunities offered by the all-embracing Internet of Things (IoT) technology, it also poses a tremendous threat to the privacy of the carriers of these devices. In t...
Hannes Gross, Marko Hölbl, Daniel Slamanig, R...
CANS
2015
Springer
26views Cryptology» more  CANS 2015»
10 months 11 days ago
What Users Should Know About Full Disk Encryption Based on LUKS
Mobile devices, laptops, and USB memory usually store large amounts of sensitive information frequently unprotected. Unauthorized access to or release of such information could rev...
Simone Bossi, Andrea Visconti
SACRYPT
2015
Springer
10 months 11 days ago
Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption
There has been great progress regarding efficient implementations of fully homomorphic encryption schemes since the first construction by Gentry. However, evaluating complex circu...
Marie Paindavoine, Bastien Vialla
SACRYPT
2015
Springer
10 months 11 days ago
Formal Treatment of Privacy-Enhancing Credential Systems
Privacy-enhancing attribute-based credentials (PABCs) are the core ingredient to privacy-friendly authentication systems, allowing users to obtain credentials on attributes and pro...
Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert L...
books