Sciweavers

319 search results - page 21 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
CEAS
2004
Springer
15 years 3 months ago
Personalised, Collaborative Spam Filtering
The state of the art sees content-based filters tending towards collaborative filters, whereby email is filtered at the MTA with users feeding information back about false posit...
Alan Gray, Mads Haahr
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
15 years 3 months ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu
ASIACRYPT
2011
Springer
13 years 9 months ago
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge
A fundamental question in cryptography deals with understanding the role that randomness plays in cryptographic protocols and to what extent it is necessary. One particular line o...
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, A...
IACR
2011
101views more  IACR 2011»
13 years 9 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
105
Voted
ICQNM
2008
IEEE
201views Chemistry» more  ICQNM 2008»
15 years 4 months ago
Loss-Tolerant Quantum Coin Flipping
Coin flipping is a cryptographic primitive in which two spatially separated players, who in principle do not trust each other, wish to establish a common random bit. If we limit ...
Guido Berlín, Gilles Brassard, Félix...