Sciweavers

555 search results - page 96 / 111
» From ABZ to Cryptography
Sort
View
ACNS
2010
Springer
145views Cryptology» more  ACNS 2010»
15 years 3 months ago
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising
Abstract. Web advertisers prefer the cost-per-action (CPA) advertisement model whereby an advertiser pays a web publisher according to the actual amount of transactions, rather tha...
Xuhua Ding
NSDI
2008
15 years 2 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
ASAP
2008
IEEE
105views Hardware» more  ASAP 2008»
15 years 1 months ago
Fast custom instruction identification by convex subgraph enumeration
Automatic generation of custom instruction processors from high-level application descriptions enables fast design space exploration, while offering very favorable performance and...
Kubilay Atasu, Oskar Mencer, Wayne Luk, Can C. &Ou...
CCS
2008
ACM
15 years 1 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
ICISC
2007
125views Cryptology» more  ICISC 2007»
15 years 1 months ago
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
In the 80’s Matsumoto and Imai [8] proposed public key cryptosystems based on the difficulty of solving systems of polynomials in several variables. Although these first schemes...
Antoine Scemama