Sciweavers

507 search results - page 64 / 102
» The XTR Public Key System
Sort
View
115
Voted
WPES
2004
ACM
15 years 6 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
95
Voted
AAAI
2006
15 years 2 months ago
Monitoring Food Safety by Detecting Patterns in Consumer Complaints
EPFC (Emerging Patterns in Food Complaints) is the analytical component of the Consumer Complaint Monitoring System, designed to help the food safety officials to efficiently and ...
Artur Dubrawski, Kimberly Elenberg, Andrew W. Moor...
123
Voted
WPES
2006
ACM
15 years 6 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
108
Voted
EUROCRYPT
2009
Springer
16 years 1 months ago
Cube Attacks on Tweakable Black Box Polynomials
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...
Itai Dinur, Adi Shamir
93
Voted
ICIP
2009
IEEE
16 years 1 months ago
Palmprint Verification Using Consistent Orientation Coding
Developing accurate and robust palmprint verification algorithms is one of the key issues in automatic palmprint recognition systems. Recently, orientation based coding algorithms...