Sciweavers

488 search results - page 25 / 98
» Policy-Based Cryptography and Applications
Sort
View
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
15 years 2 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
DSOM
2006
Springer
15 years 1 months ago
Conflict Prevention Via Model-Driven Policy Refinement
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Steven Davy, Brendan Jennings, John Strassner
ICCSA
2005
Springer
15 years 3 months ago
Data Protection Based on Physical Separation: Concepts and Application Scenarios
Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusi...
Stefan Lindskog, Karl-Johan Grinnemo, Anna Brunstr...
ARITH
1997
IEEE
15 years 1 months ago
Theory and applications for a double-base number system
In this paper we present a rigorous theoretical analysis of the main properties of a double base number system, using bases 2 and 3; in particular we emphasize the sparseness of t...
Vassil S. Dimitrov, Graham A. Jullien, William C. ...
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
15 years 4 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas