Sciweavers

507 search results - page 95 / 102
» The relation between protocols and games
Sort
View
91
Voted
TIT
2008
164views more  TIT 2008»
15 years 8 days ago
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes
We investigate the decoding problem of Reed-Solomon (RS) Codes, also known as the Polynomial Reconstruction Problem (PR), from a cryptographic hardness perspective. Namely, we dea...
Aggelos Kiayias, Moti Yung
112
Voted
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
15 years 6 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
HPCC
2005
Springer
15 years 5 months ago
A Hybrid Web Server Architecture for Secure e-Business Web Applications
Nowadays the success of many e-commerce applications, such as on-line banking, depends on their reliability, robustness and security. Designing a web server architecture that keep...
Vicenç Beltran, David Carrera, Jordi Guitar...
AIMS
2008
Springer
15 years 2 months ago
Entwined Influences of Users' Behaviour and QoS: A Multi-model Approach
In distributed, dynamic networks and applications, such as Peer-to-Peer (P2P), users'behaviour and quality of service/quality of experiment1 are known to influence each other....
Julien Siebert, Vincent Chevrier, Laurent Ciarlett...
BMCBI
2007
128views more  BMCBI 2007»
15 years 15 days ago
Detailed estimation of bioinformatics prediction reliability through the Fragmented Prediction Performance Plots
Background: An important and yet rather neglected question related to bioinformatics predictions is the estimation of the amount of data that is needed to allow reliable predictio...
Oliviero Carugo