204
Voted
ACNS
9 years 11 months ago
2015 Springer
Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within severa...
116
Voted
ACNS
9 years 11 months ago
2015 Springer
Cryptographic protocols are commonly designed and their security proven under the assumption that the protocol parties have access to perfect (uniform) randomness. Physical randomn...
113
Voted
ACNS
9 years 11 months ago
2015 Springer
Abstract. Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contai...
113
Voted
ACNS
9 years 11 months ago
2015 Springer
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. They have been proposed to provide h...
108
click to vote
ACNS
9 years 11 months ago
2015 Springer
A common countermeasure to thwart side-channel analysis attacks is algorithmic masking. For this, algorithms that mix Boolean and arithmetic operations need to either apply two diļ...
|