Sciweavers

2237 search results - page 74 / 448
» On the Security of Random Sources
Sort
View
137
Voted
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
15 years 9 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
116
Voted
ICAD
2004
15 years 6 months ago
Selective and Divided Attention: Extracting Information from Simultaneous Sound Sources
The way in which sounds interact and interfere with each other (both acoustically and perceptually) has an important influence on how well an auditory display can convey informati...
Barbara G. Shinn-Cunningham, Antje Ihlefeld
143
Voted
CORR
2007
Springer
150views Education» more  CORR 2007»
15 years 4 months ago
Composable Security in the Bounded-Quantum-Storage Model
We give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Damg...
Stephanie Wehner, Jürg Wullschleger
129
Voted
JUCS
2008
143views more  JUCS 2008»
15 years 4 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
MOBISYS
2011
ACM
14 years 7 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...