Sciweavers

524 search results - page 27 / 105
» On the Security of the DeKaRT Primitive
Sort
View
140
Voted
IFIP
2010
Springer
14 years 8 months ago
Reasoning about Probabilistic Security Using Task-PIOAs
Abstract. Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framewo...
Aaron D. Jaggard, Catherine Meadows, Michael Mislo...
113
Voted
FSTTCS
2010
Springer
14 years 11 months ago
Lower bounds for Quantum Oblivious Transfer
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic security is impossible, quantum oblivious transfer protocols can limit the disho...
André Chailloux, Iordanis Kerenidis, Jamie ...
SCN
2010
Springer
163views Communications» more  SCN 2010»
14 years 11 months ago
Time-Specific Encryption
This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Inst...
Kenneth G. Paterson, Elizabeth A. Quaglia
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 11 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
102
Voted
CHI
2011
ACM
14 years 5 months ago
Home automation in the wild: challenges and opportunities
Visions of smart homes have long caught the attention of researchers and considerable effort has been put toward enabling home automation. However, these technologies have not bee...
A. J. Bernheim Brush, Bongshin Lee, Ratul Mahajan,...