Sciweavers

82
Voted
PROVSEC
2015
Springer
9 years 11 months ago
BetterTimes - Privacy-Assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields
We present a privacy-assured multiplication protocol using which an arbitrary arithmetic formula with inputs from two parties over a finite field Fp can be jointly computed on en...
Per A. Hallgren, Martín Ochoa, Andrei Sabel...
131
Voted
PROVSEC
2015
Springer
9 years 11 months ago
Functional Signcryption: Notion, Construction, and Applications
Functional encryption (FE) enables sophisticated control over decryption rights in a multi-user scenario, while functional signature (FS) allows to enforce complex constraints on s...
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
82
Voted
PROVSEC
2015
Springer
9 years 11 months ago
Unique Signature with Short Output from CDH Assumption
Abstract. We give a simple and efficient construction of unique signature on groups equipped with bilinear map. In contrast to prior works, our proof of security is based on comput...
Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng
197
Voted
PROFES
2015
Springer
9 years 11 months ago
Is Water-Scrum-Fall Reality? On the Use of Agile and Traditional Development Practices
Abstract. For years, agile methods are considered the most promising route toward successful software development, and a considerable number of published studies the (successful) u...
Georgios Theocharis, Marco Kuhrmann, Jürgen M...
139
Voted
PROFES
2015
Springer
9 years 11 months ago
Investigating Functional and Code Size Measures for Mobile Applications: A Replicated Study
In this paper we apply a measurement procedure proposed by van Heeringen and van Gorp to approximate the COSMIC size of mobile applications. We compare this procedure with the one ...
Filomena Ferrucci, Carmine Gravino, Pasquale Salza...