Sciweavers

849 search results - page 110 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 6 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
108
Voted
NOSSDAV
2005
Springer
15 years 6 months ago
Multi-context voice communication in a SIP/SIMPLE-based shared virtual sound room with early reflections
An improved prototype of the “voiscape” voice communication medium has been developed and subjectively evaluated. Voiscape enables natural and seamless voice communication by ...
Yasusi Kanada
107
Voted
TIT
2008
187views more  TIT 2008»
14 years 12 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
93
Voted
CSFW
2008
IEEE
15 years 7 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
103
Voted
ACSAC
2006
IEEE
15 years 4 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark