Sciweavers

4 search results - page 1 / 1
» The Limits of Composable Crypto with Transferable Setup Devi...
Sort
View
CORR
2007
Springer
150views Education» more  CORR 2007»
14 years 9 months ago
Composable Security in the Bounded-Quantum-Storage Model
We give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Damg...
Stephanie Wehner, Jürg Wullschleger
SERP
2003
14 years 11 months ago
Memory Access Characteristics of Network Infrastructure Applications
Network infrastructure is composed of various devices located either in the core or at the edges of a wide-area network. These devices are required to deliver high transaction thr...
Abdul Waheed
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
14 years 11 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
ICRA
2007
IEEE
135views Robotics» more  ICRA 2007»
15 years 3 months ago
Robot-Dummy Crash Tests for Robot Safety Assessment
— New technologies and processes enhance the need for direct human-robot-interaction, to fully exploit the potential of robots’ accuracy and humans’ adaptability. Therefore, ...
Susanne Oberer, Rolf Dieter Schraft