Sciweavers

155
Voted
PKC
2010
Springer
217views Cryptology» more  PKC 2010»
15 years 9 months ago
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
Lossy Trapdoor Functions (LTDFs), introduced by Peikert and Waters (STOC 2008) have been useful for building many cryptographic primitives. In particular, by using an LTDF that los...
Petros Mol, Scott Yilek
114
Voted
PKC
2010
Springer
175views Cryptology» more  PKC 2010»
15 years 9 months ago
Secure Network Coding over the Integers
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal...
136
Voted
PKC
2010
Springer
183views Cryptology» more  PKC 2010»
15 years 9 months ago
Unlinkability of Sanitizable Signatures
Sanitizable signatures allow a designated party, called the sanitizer, to modify parts of signed data such that the immutable parts can still be verified with respect to the origi...
Christina Brzuska, Marc Fischlin, Anja Lehmann, Do...
CNSR
2007
IEEE
336views Communications» more  CNSR 2007»
15 years 9 months ago
Energy Efficient Data Routing in Wireless Sensor Network: A Mixed Approach
This paper presents a data routing protocol for a non-mobile, locationaware wireless sensor network that is primarily designed for continuous monitoring application (e.g. environm...
Md. Ashiqur Rahman, Sajid Hussain
135
Voted
PET
2010
Springer
15 years 9 months ago
Drac: An Architecture for Anonymous Low-Volume Communications
We present Drac, a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary. The...
George Danezis, Claudia Díaz, Carmela Tronc...