Sciweavers

222 search results - page 8 / 45
» di 2010
Sort
View
COMPSEC
2010
98views more  COMPSEC 2010»
14 years 12 months ago
Managing key hierarchies for access control enforcement: Heuristic approaches
Carlo Blundo, Stelvio Cimato, Sabrina De Capitani ...
PAIRING
2010
Springer
116views Cryptology» more  PAIRING 2010»
14 years 10 months ago
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the s...
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
63
Voted
IPPS
2010
IEEE
14 years 9 months ago
Efficient lists intersection by CPU-GPU cooperative computing
Di Wu, Fan Zhang, Naiyong Ao, Gang Wang, Xiaoguang...
63
Voted
EVOW
2010
Springer
15 years 3 months ago
Exploiting Evolution for an Adaptive Drift-Robust Classifier in Chemical Sensing
Stefano Di Carlo, Matteo Falasconi, Ernesto S&aacu...
53
Voted
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
15 years 27 days ago
When Failure Analysis Meets Side-Channel Attacks
Jerome Di-Battista, Jean-Christophe Courrèg...