Semantic security

Results: 252



#Item
191Privacy / Privacy Office of the U.S. Department of Homeland Security / Law / Human rights / ADVISE / Internet privacy / FTC Fair Information Practice / Chief privacy officer / Personally identifiable information / United States Department of Homeland Security / Government / Ethics

ADVISE Report DHS Privacy Office Review of the Analysis, Dissemination, Visualization, Insight and Semantic Enhancement (ADVISE) Program July 11, 2007

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2007-07-23 09:53:06
192Random oracle / Key / Semantic security / Digital signature / Cryptography / Public-key cryptography / Key management

How to Leak on Key Updates Allison Lewko ∗ University of Texas at Austin [removed] Mark Lewko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-04 15:59:12
193Semantic security / Ciphertext / Encryption / Cryptography / RSA / Ciphertext indistinguishability

Storing Secrets on Continually Leaky Devices Yevgeniy Dodis∗ Allison Lewko †

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-07-06 13:12:34
194Malleability / Cramer–Shoup cryptosystem / Authenticated encryption / Ciphertext / Chosen-plaintext attack / Deterministic encryption / RSA / Advantage / Semantic security / Cryptography / Chosen-ciphertext attack / Ciphertext indistinguishability

Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University Allison Lewko†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-16 11:47:41
195Semantic security / XTR / ID-based encryption / Security / Applied mathematics / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Cyberwarfare

Witness Encryption from Instance Independent Assumptions Craig Gentry IBM Research, T.J. Watson [removed] Allison Bishop Lewko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-30 01:07:28
196Computer security / HTTP / Security / Access control / Semantic URL attack / Apple ID / Password / Federated identity / Cryptographic software

To view your Weekly Market Bulletin, you must access the New Hampshire Secure File Transfer System. Click on the link below or open a browser and type in https://nhftp.nh.gov/. 1. The first time you access this site, you

Add to Reading List

Source URL: www.agriculture.nh.gov

Language: English - Date: 2014-03-18 08:51:12
197Semantic Web / Cryptographic protocols / Secure communication / FOAF / HTTP Secure / Transport Layer Security / Named graph / X.509 / Public key infrastructure / Cryptography / Public-key cryptography / Key management

FOAF+SSL: RESTful Authentication for the Social Web? Henry Story1 , Bruno Harbulot2 , Ian Jacobi3 , and Mike Jones2 1 2

Add to Reading List

Source URL: dig.csail.mit.edu

Language: English - Date: 2011-02-01 14:35:32
198Probabilistic latent semantic analysis / Security / Email / Information security / Computing / Statistics / Statistical natural language processing / Categorical data

Microsoft Word - PLSA_FPA_08302010.doc

Add to Reading List

Source URL: www.fms.treas.gov

Language: English - Date: 2011-04-11 10:34:39
199Email / Computing / Statistical natural language processing / Categorical data / Probabilistic latent semantic analysis

Shared Accounting Module (SAM) Primary Local Security Administrator (PLSA) Authorization Form The Officer identified below designates the following to serve as Primary Local Security Administrator (PLSA) for the Shared A

Add to Reading List

Source URL: www.fms.treas.gov

Language: English - Date: 2013-09-10 15:04:02
200Probabilistic latent semantic analysis / Security / Email / Information security / Computing / Statistics / Statistical natural language processing / Categorical data

Microsoft Word - PLSA_FI_08302010.doc

Add to Reading List

Source URL: fms.treas.gov

Language: English - Date: 2011-04-11 10:34:39
UPDATE