×

Found 61,362 Documents (Results 1–100)

Factorization of behavioral integrity. (English) Zbl 1499.68050

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 500-519 (2015).
MSC:  68M25 68Q85 94A60
PDF BibTeX XML Cite
Full Text: DOI

Attribute based broadcast encryption with short ciphertext and decryption key. (English) Zbl 1499.94051

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 252-269 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Checking trace equivalence: how to get rid of nonces? (English) Zbl 1499.68048

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 230-251 (2015).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Typing and compositionality for security protocols: a generalization to the geometric fragment. (English) Zbl 1499.68043

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 209-229 (2015).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Batch verifiable computation of polynomials on outsourced data. (English) Zbl 07573627

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 167-185 (2015).
MSC:  68M25 68M11 94A60
PDF BibTeX XML Cite
Full Text: DOI

Practical invalid curve attacks on TLS-ECDH. (English) Zbl 1504.94150

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 407-425 (2015).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Practical threshold password-authenticated secret sharing protocol. (English) Zbl 1503.94053

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 347-365 (2015).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Making any identity-based encryption accountable, efficiently. (English) Zbl 1504.94160

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 326-346 (2015).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Efficient zero-knowledge proofs for commitments from learning with errors over rings. (English) Zbl 1499.68113

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 305-325 (2015).
MSC:  68Q10 68Q11 94A60
PDF BibTeX XML Cite
Full Text: DOI

Server-aided revocable identity-based encryption. (English) Zbl 1499.68057

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 286-304 (2015).
MSC:  68M25 68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Updatable hash proof system and its applications. (English) Zbl 1502.94041

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 266-285 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Short accountable ring signatures based on DDH. (English) Zbl 1499.94054

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 243-265 (2015).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Symmetric-key based proofs of retrievability supporting public verification. (English) Zbl 1499.68092

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 203-223 (2015).
PDF BibTeX XML Cite
Full Text: DOI

Efficient message authentication codes with combinatorial group testing. (English) Zbl 1504.94220

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 185-202 (2015).
MSC:  94A62 94A60 68M25
PDF BibTeX XML Cite
Full Text: DOI

Interleaving cryptanalytic time-memory trade-offs on non-uniform distributions. (English) Zbl 1504.94097

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 165-184 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Verifiably encrypted signatures: security revisited and a new construction. (English) Zbl 1504.94212

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 146-164 (2015).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Computational soundness for interactive primitives. (English) Zbl 1502.68052

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 125-145 (2015).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Information-based physics, influence, and forces. (English) Zbl 1483.94022

Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 538-547 (2015).
MSC:  94A15 81P10
PDF BibTeX XML Cite
Full Text: DOI Link

Debruijn identities: from Shannon, Kullback-Leibler and Fisher to generalized \(\phi \)-entropies, \( \phi \)-divergences and \(\phi \)-Fisher informations. (English) Zbl 1483.62008

Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 522-529 (2015).
MSC:  62B10 94A17 94A24
PDF BibTeX XML Cite
Full Text: DOI

Application of Kähler manifold to signal processing and Bayesian inference. (English) Zbl 1483.53121

Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 113-120 (2015).
MSC:  53Z50 62F15 94A15
PDF BibTeX XML Cite
Full Text: DOI arXiv

Shannon’s formula and Hartley’s rule: a mathematical coincidence? (English) Zbl 1483.62065

Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 105-112 (2015).
MSC:  62F15 62-03 94A24
PDF BibTeX XML Cite
Full Text: DOI

Bayesian or Laplacien inference, entropy and information theory and information geometry in data and signal processing. (English) Zbl 1483.62011

Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 43-58 (2015).
MSC:  62B11 62F15 94A17
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software