Sciweavers

3210 search results - page 121 / 642
» Secure Similarity Search
Sort
View
122
Voted
SOUPS
2006
ACM
15 years 11 months ago
Protecting domestic power-line communications
– In this paper we describe the protection goals and mechanisms in HomePlug AV, a next-generation power-line communications standard. This is a fascinating case-history in securi...
Richard E. Newman, Sherman Gavette, Larry Yonge, R...
150
Voted
CRYPTO
2005
Springer
137views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
A Formal Treatment of Onion Routing
Anonymous channels are necessary for a multitude of privacy-protecting protocols. Onion routing is probably the best known way to achieve anonymity in practice. However, the crypto...
Jan Camenisch, Anna Lysyanskaya
JCS
2010
80views more  JCS 2010»
14 years 12 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
153
Voted
CCS
2009
ACM
15 years 9 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
CHI
2008
ACM
16 years 5 months ago
MQSearch: image search by multi-class query
Image search is becoming prevalent in web search as the number of digital photos grows exponentially on the internet. For a successful image search system, removing outliers in th...
Yiwen Luo, Wei Liu, Jianzhuang Liu, Xiaoou Tang