Sciweavers

1255 search results - page 108 / 251
» On Simple and Secure Key Distribution
Sort
View
134
Voted
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
15 years 9 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
183
Voted
P2P
2009
IEEE
231views Communications» more  P2P 2009»
15 years 10 months ago
Measuring the Cost of Online Load-Balancing in Distributed Range-Queriable Systems
Distributed systems such as Peer-to-Peer overlays have been shown to efficiently support the processing of range queries over large numbers of participating hosts. In such system...
Ioannis Konstantinou, Dimitrios Tsoumakos, Nectari...
172
Voted
NDSS
2003
IEEE
15 years 9 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
QUESTA
2007
117views more  QUESTA 2007»
15 years 3 months ago
Estimating tail probabilities of heavy tailed distributions with asymptotically zero relative error
Efficient estimation of tail probabilities involving heavy tailed random variables is amongst the most challenging problems in Monte-Carlo simulation. In the last few years, appli...
Sandeep Juneja
153
Voted
IANDC
2007
151views more  IANDC 2007»
15 years 3 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke