Sciweavers

ACNS
2015
Springer
29views Cryptology» more  ACNS 2015»
9 years 9 months ago
A Fully Decentralized Data Usage Control Enforcement Infrastructure
Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within severa...
Florian Kelbert, Alexander Pretschner
ACNS
2015
Springer
22views Cryptology» more  ACNS 2015»
9 years 9 months ago
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Cryptographic protocols are commonly designed and their security proven under the assumption that the protocol parties have access to perfect (uniform) randomness. Physical randomn...
Michael Backes 0001, Aniket Kate, Sebastian Meiser...
89
Voted
ACNS
2015
Springer
20views Cryptology» more  ACNS 2015»
9 years 9 months ago
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Abstract. Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contai...
Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwa...
89
Voted
ACNS
2015
Springer
28views Cryptology» more  ACNS 2015»
9 years 9 months ago
mrPUF: A Novel Memristive Device Based Physical Unclonable Function
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. They have been proposed to provide h...
Yansong Gao, Damith Chinthana Ranasinghe, Said F. ...
ACNS
2015
Springer
21views Cryptology» more  ACNS 2015»
9 years 9 months ago
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
A common countermeasure to thwart side-channel analysis attacks is algorithmic masking. For this, algorithms that mix Boolean and arithmetic operations need to either apply two diļ...
Tobias Schneider, Amir Moradi, Tim Güneysu
Cryptology
Top of PageReset Settings