217
click to vote
ACNS
10 years 26 days ago
2015 Springer
Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within severa...
128
click to vote
ACNS
10 years 26 days ago
2015 Springer
Cryptographic protocols are commonly designed and their security proven under the assumption that the protocol parties have access to perfect (uniform) randomness. Physical randomn...
127
click to vote
ACNS
10 years 26 days ago
2015 Springer
Abstract. Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contai...
125
click to vote
ACNS
10 years 26 days ago
2015 Springer
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. They have been proposed to provide h...
125
click to vote
ACNS
10 years 26 days ago
2015 Springer
The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is ...
|