Sciweavers

4134 search results - page 525 / 827
» Collaborative Practice Research
Sort
View
ANTS
2006
Springer
101views Algorithms» more  ANTS 2006»
15 years 8 months ago
High Security Pairing-Based Cryptography Revisited
The security and performance of pairing based cryptography has provoked a large volume of research, in part because of the exciting new cryptographic schemes that it underpins. We ...
Robert Granger, Dan Page, Nigel P. Smart
CANS
2006
Springer
129views Cryptology» more  CANS 2006»
15 years 8 months ago
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
CIT
2006
Springer
15 years 8 months ago
Bridging the Gap Between Reality and Simulations: An Ethernet Case Study
Simulation is a widely used technique in networking research and a practice that has suffered loss of credibility in recent years due to doubts about its reliability. In this pape...
Punit Rathod, Srinath Perur, Raghuraman Rangarajan
ESORICS
2006
Springer
15 years 8 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
FOSSACS
2006
Springer
15 years 8 months ago
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
Abstract. Web services are an important series of industry standards for adding semantics to web-based and XML-based communication, in particular among enterprises. Like the entire...
Michael Backes, Sebastian Mödersheim, Birgit ...