159
click to vote
ACNS
9 years 8 months ago
2015 Springer
Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within severa...
ACNS
9 years 8 months ago
2015 Springer
Cryptographic protocols are commonly designed and their security proven under the assumption that the protocol parties have access to perfect (uniform) randomness. Physical randomn...
ACNS
9 years 8 months ago
2015 Springer
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. They have been proposed to provide h...
ACNS
9 years 8 months ago
2015 Springer
The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is ...
ACNS
9 years 8 months ago
2015 Springer
There is a growing need to develop lightweight cryptographic primitives suitable for resource-constrained devices permeating in increasing numbers into the fabric of life. Such dev...
|