Sciweavers

712 search results - page 21 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
76
Voted
ACISP
2003
Springer
15 years 2 months ago
On the Pseudorandomness of KASUMI Type Permutations
KASUMI is a block cipher which has been adopted as a standard of 3GPP. In this paper, we study the pseudorandomness of idealized KASUMI type permutations for adaptive adversaries. ...
Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa
ESORICS
2009
Springer
15 years 10 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li
FC
2006
Springer
109views Cryptology» more  FC 2006»
15 years 1 months ago
A Private Stable Matching Algorithm
Existing stable matching algorithms reveal the preferences of all participants, as well as the history of matches made and broken in the course of computing a stable match. This in...
Philippe Golle
66
Voted
WPES
2004
ACM
15 years 3 months ago
Specifying privacy policies with P3P and EPAL: lessons learned
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
William H. Stufflebeam, Annie I. Antón, Qin...
89
Voted
SCN
2008
Springer
14 years 9 months ago
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
In this paper, we build, in a generic way, two asymmetric cryptosystems with a careful study of their security. We present first an additively homomorphic scheme which generalizes,...
Guilhem Castagnos