Sciweavers

74 search results - page 11 / 15
» Fully Leakage-Resilient Signatures
Sort
View
ESOP
2005
Springer
15 years 3 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
CCS
2006
ACM
15 years 1 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
ISCA
2003
IEEE
120views Hardware» more  ISCA 2003»
15 years 3 months ago
ReEnact: Using Thread-Level Speculation Mechanisms to Debug Data Races in Multithreaded Codes
While removing software bugs consumes vast amounts of human time, hardware support for debugging in modern computers remains rudimentary. Fortunately, we show that mechanisms for ...
Milos Prvulovic, Josep Torrellas
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 7 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
ECCV
2004
Springer
15 years 11 months ago
Hand Gesture Recognition within a Linguistics-Based Framework
An approach to recognizing human hand gestures from a monocular temporal sequence of images is presented. Of particular concern is the representation and recognition of hand movem...
Konstantinos G. Derpanis, Richard P. Wildes, John ...