Sciweavers

5722 search results - page 265 / 1145
» Security Function Interactions
Sort
View
DAGSTUHL
2007
15 years 4 months ago
QUAD: Overview and Recent Developments
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [6]. The cipher relies on the iteration of a multivaria...
David Arditti, Côme Berbain, Olivier Billet,...
IEICET
2008
119views more  IEICET 2008»
15 years 3 months ago
Universally Composable Identity-Based Encryption
Abstract-- The identity-based encryption (IBE) is one of the most important primitives in cryptography, and various security notions of IBE (e.g., IND-ID-CCA2, NM-ID-CCA2, IND-sID-...
Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto
CORR
2006
Springer
82views Education» more  CORR 2006»
15 years 3 months ago
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such ...
Véronique Cortier, Heinrich Hördegen, ...
IJNSEC
2007
139views more  IJNSEC 2007»
15 years 3 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
TEI
2010
ACM
120views Hardware» more  TEI 2010»
15 years 10 months ago
Project 6453: a multi-touch interactive table in a concept showroom
This project realized a multi-touch interactive table designed for 4 people use at the same time, which integrates USB, Bluetooth, and email functionality to serve as an on-site i...
Ting-Han Chen, Chi-Huang Lu, Chi-Fa Fan