Sciweavers

14824 search results - page 2586 / 2965
» Security - Introduction
Sort
View
88
Voted
EUC
2005
Springer
15 years 9 months ago
Human Position/Height Detection Using Analog Type Pyroelectric Sensors
Abstract. Pyroelectric sensors can detect changes of infrared rays. Usually, typical pyroelectric sensors are the digital output type, used for lighting switches and security syste...
Shinya Okuda, Shigeo Kaneda, Hirohide Haga
142
Voted
EUROCRYPT
2005
Springer
15 years 9 months ago
Computational Indistinguishability Between Quantum States and Its Cryptographic Application
We introduce a computational problem of distinguishing between two specific quantum states as a new cryptographic problem to design a quantum cryptographic scheme that is “secu...
Akinori Kawachi, Takeshi Koshiba, Harumichi Nishim...
137
Voted
EUROCRYPT
2005
Springer
15 years 9 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
119
Voted
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 9 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
121
Voted
FC
2005
Springer
97views Cryptology» more  FC 2005»
15 years 9 months ago
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
Abstract. We propose a scheme for privacy-preserving escrow of financial transactions. The objective of the scheme is to preserve privacy and anonymity of the individual user enga...
Stanislaw Jarecki, Vitaly Shmatikov
« Prev « First page 2586 / 2965 Last » Next »