Sciweavers

209 search results - page 12 / 42
» ideal 2009
Sort
View
CCS
2009
ACM
15 years 10 months ago
Universally composable contributory group key exchange
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by maliciou...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
TCC
2009
Springer
160views Cryptology» more  TCC 2009»
15 years 10 months ago
Simple, Black-Box Constructions of Adaptively Secure Protocols
We present a compiler for transforming an oblivious transfer (OT) protocol secure against an adaptive semi-honest adversary into one that is secure against an adaptive malicious ad...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...
BSN
2009
IEEE
120views Sensor Networks» more  BSN 2009»
15 years 4 months ago
Textile-Based Wearable Sensors for Assisting Sports Performance
—There is a need for wearable sensors to assess physiological signals and body kinematics during exercise. Such sensors need to be straightforward to use, and ideally the complet...
Shirley Coyle, Deirdre Morris, King Tong Lau, Derm...
PERVASIVE
2009
Springer
15 years 4 months ago
Realistic Driving Trips For Location Privacy
Simulated, false location reports can be an effective way to confuse a privacy attacker. When a mobile user must transmit his or her location to a central server, these location re...
John Krumm
STACS
2009
Springer
15 years 4 months ago
Quantum Query Complexity of Multilinear Identity Testing
Motivated by the quantum algorithm for testing commutativity of black-box groups (Magniez and Nayak, 2007), we study the following problem: Given a black-box finite ring by an add...
Vikraman Arvind, Partha Mukhopadhyay