Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
The paper is written jointly by two parties, computer scientists specializing in geovisualization and experts in forestry, who cooperated within a joint project. The authors tell ...
Gennady L. Andrienko, Natalia V. Andrienko, Richar...
The US Power Industry is in the process of overhauling the Power Grid to make it more secure, reliable, and available. The IT systems that comprise a major part of this change nee...
Himanshu Khurana, Mohammad Maifi Hasan Khan, Von W...
We introduce the novel concept of covert two-party computation. Whereas ordinary secure two-party computation only guarantees that no more knowledge is leaked about the inputs of t...
We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has m...