Information-theoretic security

Results: 33



#Item
1Information-Theoretic Security Analysis of Physical Uncloneable Functions  c, S. Stallinga, A.H.M. Akkermans, W. Ophey P. Tuyls, B. Skori Philips Research Laboratories, Prof. Holstlaan 4,

Information-Theoretic Security Analysis of Physical Uncloneable Functions  c, S. Stallinga, A.H.M. Akkermans, W. Ophey P. Tuyls, B. Skori Philips Research Laboratories, Prof. Holstlaan 4,

Add to Reading List

Source URL: fc05.ifca.ai

Language: English - Date: 2005-01-13 13:56:52
    2Secure or Insure? A Game-Theoretic Analysis of Information Security Games Jens Grossklags Nicolas Christin

    Secure or Insure? A Game-Theoretic Analysis of Information Security Games Jens Grossklags Nicolas Christin

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    - Date: 2016-08-21 11:38:22
      3Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

      Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

      Add to Reading List

      Source URL: www.winlab.rutgers.edu

      Language: English - Date: 2011-08-05 21:36:39
      4ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

      ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

      Add to Reading List

      Source URL: www.crypto.ethz.ch

      Language: English - Date: 2015-04-20 05:08:37
      5C:/Users/Bin/Documents/proposal/proposalTex/security/secretKeyNew/final_for_TVT/BinZanTVT.dvi

      C:/Users/Bin/Documents/proposal/proposalTex/security/secretKeyNew/final_for_TVT/BinZanTVT.dvi

      Add to Reading List

      Source URL: www.winlab.rutgers.edu

      Language: English - Date: 2013-05-10 14:02:36
      6The proceedings version of this paper appears in ACM CCSThis is the full version of that paper.  Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

      The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2007-08-20 03:37:31
      72748  IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 5, MAY 2012 Three-Receiver Broadcast Channels With Common and Confidential Messages

      2748 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 5, MAY 2012 Three-Receiver Broadcast Channels With Common and Confidential Messages

      Add to Reading List

      Source URL: isl.stanford.edu

      Language: English - Date: 2014-08-08 14:33:18
      8On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack Svitlana Vyetrenko  Aditya Khosla

      On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack Svitlana Vyetrenko Aditya Khosla

      Add to Reading List

      Source URL: www.its.caltech.edu

      Language: English - Date: 2010-10-15 13:27:00
        9Timed-Release Secret Sharing Schemes with Information Theoretic Security Yohei Watanabe and Junji Shikata Yokohama National University, Japan BalkanCryptSec 2014

        Timed-Release Secret Sharing Schemes with Information Theoretic Security Yohei Watanabe and Junji Shikata Yokohama National University, Japan BalkanCryptSec 2014

        Add to Reading List

        Source URL: www.gstl.itu.edu.tr

        Language: English - Date: 2014-10-18 19:43:37
          10Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

          Arpita Patra Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB,

          Add to Reading List

          Source URL: www.cs.bris.ac.uk

          Language: English - Date: 2012-09-07 07:03:05