167
click to vote
ACNS
9 years 9 months ago
2015 Springer
Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within severa...
ACNS
9 years 9 months ago
2015 Springer
Cryptographic protocols are commonly designed and their security proven under the assumption that the protocol parties have access to perfect (uniform) randomness. Physical randomn...
89
Voted
ACNS
9 years 9 months ago
2015 Springer
Abstract. Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contai...
89
Voted
ACNS
9 years 9 months ago
2015 Springer
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. They have been proposed to provide h...
ACNS
9 years 9 months ago
2015 Springer
A common countermeasure to thwart side-channel analysis attacks is algorithmic masking. For this, algorithms that mix Boolean and arithmetic operations need to either apply two diļ...
|