Semantic security

Results: 252



#Item
41A Retrospective on ORCA: Open Resource Control Architecture 1  Jeff Chase and Ilya Baldin

A Retrospective on ORCA: Open Resource Control Architecture 1 Jeff Chase and Ilya Baldin

Add to Reading List

Source URL: www.cs.duke.edu

Language: English - Date: 2014-12-19 16:15:30
42An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-02-21 12:47:44
43Leakage-Resilient Cryptography from Minimal Assumptions Carmit Hazay∗ Adriana L´opez-Alt†  Hoeteck Wee‡

Leakage-Resilient Cryptography from Minimal Assumptions Carmit Hazay∗ Adriana L´opez-Alt† Hoeteck Wee‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-12-09 09:25:45
44A Framework for Modeling Decision Making and Deception with Semantic Information

A Framework for Modeling Decision Making and Deception with Semantic Information

Add to Reading List

Source URL: ieee-security.org

- Date: 2012-06-05 18:19:02
    45Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1  National Institute of Information and Communications Technology (NICT), Japan

    Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

    Add to Reading List

    Source URL: imi.kyushu-u.ac.jp

    - Date: 2007-06-02 00:48:30
      46Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers

      Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers

      Add to Reading List

      Source URL: www.ieee-security.org

      - Date: 2012-06-05 18:19:24
        47Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties

        Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2012-06-05 18:18:54
          48Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1  National Institute of Information and Communications Technology (NICT), Japan

          Semantic Security for the McEliece Cryptosystem without Random Oracles Ryo Nojima1 , Hideki Imai23 , Kazukuni Kobara3 , and Kirill Morozov3 1 National Institute of Information and Communications Technology (NICT), Japan

          Add to Reading List

          Source URL: imi.kyushu-u.ac.jp

          Language: English - Date: 2007-03-14 18:37:42
            49Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers

            Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers

            Add to Reading List

            Source URL: ieee-security.org

            Language: English - Date: 2012-06-05 18:19:24
              50Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

              Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2012-05-22 01:36:04