197
Voted
ACNS
9 years 11 months ago
2015 Springer
Distributed data usage control enables data owners to constrain how their data is used by remote entities. However, many data usage policies refer to events happening within severa...
113
Voted
ACNS
9 years 11 months ago
2015 Springer
Cryptographic protocols are commonly designed and their security proven under the assumption that the protocol parties have access to perfect (uniform) randomness. Physical randomn...
110
Voted
ACNS
9 years 11 months ago
2015 Springer
Abstract. Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contai...
108
Voted
ACNS
9 years 11 months ago
2015 Springer
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. They have been proposed to provide h...
107
Voted
ACNS
9 years 11 months ago
2015 Springer
A common countermeasure to thwart side-channel analysis attacks is algorithmic masking. For this, algorithms that mix Boolean and arithmetic operations need to either apply two diļ...
|