Sciweavers

14824 search results - page 2403 / 2965
» Security - Introduction
Sort
View
158
Voted
CCS
2004
ACM
15 years 10 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
15 years 10 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
148
Voted
ECOOP
2004
Springer
15 years 10 months ago
Finding and Removing Performance Bottlenecks in Large Systems
Abstract. Software systems obey the 80/20 rule: aggressively optimizing a vital few execution paths yields large speedups. However, finding the vital few paths can be difficult, e...
Glenn Ammons, Jong-Deok Choi, Manish Gupta, Nikhil...
119
Voted
EUROCRYPT
2004
Springer
15 years 10 months ago
Immunizing Encryption Schemes from Decryption Errors
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Cynthia Dwork, Moni Naor, Omer Reingold
FC
2004
Springer
89views Cryptology» more  FC 2004»
15 years 10 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost e...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
« Prev « First page 2403 / 2965 Last » Next »