Semantic security

Results: 252



#Item
1Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Add to Reading List

Source URL: eftychis.org

Language: English - Date: 2018-02-16 15:03:09
2Semantic Interoperability Community of Practice (SICoP) Semantic Web Applications for National Security Conference Hyatt Regency Crystal City, Regency Ballrooms E and F Brand Niemann (US EPA) and Rick Morris (U.S. Army),

Semantic Interoperability Community of Practice (SICoP) Semantic Web Applications for National Security Conference Hyatt Regency Crystal City, Regency Ballrooms E and F Brand Niemann (US EPA) and Rick Morris (U.S. Army),

Add to Reading List

Source URL: www.daml.org

Language: English - Date: 2005-04-19 10:56:20
    32014 IEEE Symposium on Security and Privacy  SoK: Introspections on Trust and the Semantic Gap Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion Stony Brook University {bpjain, mbaig, dozhang,

    2014 IEEE Symposium on Security and Privacy SoK: Introspections on Trust and the Semantic Gap Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, and Radu Sion Stony Brook University {bpjain, mbaig, dozhang,

    Add to Reading List

    Source URL: oaklandsok.github.io

    Language: English - Date: 2018-03-14 15:33:55
      4Intelligent Semantic Query (ISQ) NOTAMS Semantic Web Applications for National Security 7 April 2005 Edward DePalma

      Intelligent Semantic Query (ISQ) NOTAMS Semantic Web Applications for National Security 7 April 2005 Edward DePalma

      Add to Reading List

      Source URL: www.daml.org

      Language: English - Date: 2005-04-19 10:56:45
        5Presentation to the Semantic Web Applications for National Security (SWANS) Conference XG Communications Program Information Briefing Preston Marshall

        Presentation to the Semantic Web Applications for National Security (SWANS) Conference XG Communications Program Information Briefing Preston Marshall

        Add to Reading List

        Source URL: www.daml.org

        Language: English - Date: 2005-04-19 10:56:07
          6Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† †  Horst Görtz Institute for IT-Security (HGI)

          Leveraging Semantic Signatures for Bug Search in Binary Programs Jannik Pewny† , Felix Schuster† , Christian Rossow‡ , Lukas Bernhard† , Thorsten Holz† † Horst Görtz Institute for IT-Security (HGI)

          Add to Reading List

          Source URL: www.ei.rub.de

          - Date: 2014-10-22 03:57:33
            7Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

            Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

            Add to Reading List

            Source URL: web.cs.ucdavis.edu

            Language: English - Date: 2003-08-29 18:48:12
            8Journey TM College Student Registration Instructions  Student Name: .

            Journey TM College Student Registration Instructions Student Name: .

            Add to Reading List

            Source URL: www.irsc.edu

            Language: English - Date: 2016-01-12 09:58:01
            9An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

            An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

            Add to Reading List

            Source URL: web.cs.ucdavis.edu

            Language: English - Date: 2007-08-20 03:23:28
            10Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1  City College, City University of New York

            Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2016-01-26 19:57:17