Sciweavers

2656 search results - page 76 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
CCS
2008
ACM
15 years 1 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
INFOCOM
2006
IEEE
15 years 6 months ago
A Node Identity Internetworking Architecture
— The Internet consists of independent networks that belong to different administrative domains and vary in scope from personal area networks, private home networks, corporate ne...
Bengt Ahlgren, Jari Arkko, Lars Eggert, Jarno Raja...
SOUPS
2009
ACM
15 years 6 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
IEEEARES
2008
IEEE
15 years 6 months ago
Performance Analysis of Anonymous Communication Channels Provided by Tor
— Providing anonymity for end-users on the Internet is a very challenging and difficult task. There are currently only a few systems that are of practical relevance for the prov...
Andriy Panchenko, Lexi Pimenidis, Johannes Renner
69
Voted
CRYPTO
2003
Springer
111views Cryptology» more  CRYPTO 2003»
15 years 5 months ago
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted communication, and various active attacks on the ...
Elad Barkan, Eli Biham, Nathan Keller