Sciweavers

1825 search results - page 100 / 365
» Cryptographic Securities Exchanges
Sort
View
136
Voted
ICS
2010
Tsinghua U.
16 years 1 months ago
Robustness of the Learning with Errors Assumption
: Starting with the work of Ishai-Sahai-Wagner and Micali-Reyzin, a new goal has been set within the theory of cryptography community, to design cryptographic primitives that are s...
Shafi Goldwasser, Yael Kalai, Chris Peikert, Vinod...
116
Voted
ESORICS
2005
Springer
15 years 9 months ago
Quantifying Probabilistic Information Flow in Computational Reactive Systems
Information flow and non-interference are well-established techniques for expressing both integrity and privacy properties. Because of the enormous potential to transmit informati...
Michael Backes
115
Voted
SP
1990
IEEE
15 years 7 months ago
Probabilistic Interference
In recent times information flow and non-interference have become very popular concepts for expressing both integrity and privacy properties. We present the first general definitio...
James W. Gray III
99
Voted
WIMOB
2008
IEEE
15 years 10 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
147
Voted
AISM
2004
15 years 5 months ago
An Examination of the Security of Routing Protocol Updates
The exchange of routing protocol updates is used to ensure that routers using an Internal Gateway Protocol (IGP) in an Autonomous System (AS), or routers using an External Gateway...
G. Murphy