Sciweavers

679 search results - page 33 / 136
» Using decision problems in public key cryptography
Sort
View
TCC
2005
Springer
102views Cryptology» more  TCC 2005»
15 years 6 months ago
Toward Privacy in Public Databases
Abstract. We initiate a theoretical study of the census problem. Informally, in a census individual respondents give private information to a trusted party (the census bureau), who...
Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam...
JCIT
2007
142views more  JCIT 2007»
15 years 1 months ago
Distributed Certification Authority for Mobile Ad Hoc Networks - A Dynamic Approach
A Mobile Ad Hoc Network (MANET) is an infrastructureless network of wireless mobile nodes that cooperate among each other to maintain connectivity of the network. In comparison to...
Sanjay Raghani, Durga Toshniwal
HICSS
2006
IEEE
185views Biometrics» more  HICSS 2006»
15 years 7 months ago
Inter-Organisational Collaboration towards Process Integration in the Public Sector. E-Government Collaboration in Egypt
This paper demonstrates the importance of collaboration between government departments as a backbone for inter-organizational integration between agencies such as ministries. We a...
Inas E. Ezz, Anastasia Papazafeiropoulou
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
14 years 4 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
CRYPTO
2009
Springer
87views Cryptology» more  CRYPTO 2009»
15 years 7 months ago
Reconstructing RSA Private Keys from Random Key Bits
sion of an extended abstract published in Proceedings of Crypto 2009, Springer-Verlag, 2009. Available from the IACR Cryptology ePrint Archive as Report 2008/510. We show that an ...
Nadia Heninger, Hovav Shacham