Sciweavers

712 search results - page 73 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
EUPROJECTS
2006
Springer
15 years 1 months ago
User Interfaces for Persons with Deafblindness
This paper examines problems persons with deafblindness have when using computers and it analyses how we can approach these problems in the redesign of a communication tool. A qual...
Sara Rutgersson, Mattias Arvola
CCS
2008
ACM
14 years 11 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
CRITIS
2008
14 years 11 months ago
Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures
The interdependencies between infrastructures may be the cause of serious problems in mission/safety critical systems. In the CRUTIAL3 project the interdependencies between the ele...
Marco Beccuti, Giuliana Franceschinis, Mohamed Ka&...
ESORICS
2008
Springer
14 years 11 months ago
Code-Carrying Authorization
In authorization, there is often a wish to shift the burden of proof to those making requests, since they may have more resources and more specific knowledge to construct the requi...
Sergio Maffeis, Martín Abadi, Cédric...
ACISP
2010
Springer
14 years 11 months ago
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA-3. Until now, little analysis has been published on its resistance to diffe...
Jean-Philippe Aumasson, Emilia Käsper, Lars R...