Sciweavers

380 search results - page 24 / 76
» Intrusion-Resilient Secret Sharing
Sort
View
TCC
2010
Springer
303views Cryptology» more  TCC 2010»
15 years 6 months ago
Efficient Rational Secret Sharing in Standard Communication Networks
Georg Fuchsbauer, Jonathan Katz, David Naccache
EUROCRYPT
2007
Springer
15 years 4 months ago
Ideal Multipartite Secret Sharing Schemes
Oriol Farràs, Jaume Martí-Farr&eacut...
UCS
2007
Springer
15 years 4 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
ACSAC
2006
IEEE
15 years 4 months ago
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we mean that it is suspected to be infected with spywar...
Dinei A. F. Florêncio, Cormac Herley
SDMW
2005
Springer
15 years 3 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...