Zobrazeno 1 - 10
of 174
pro vyhledávání: '"Paterson, Kenneth G."'
We study the security of Probabilistic Data Structures (PDS) for handling Approximate Membership Queries (AMQ); prominent examples of AMQ-PDS are Bloom and Cuckoo filters. AMQ-PDS are increasingly being deployed in environments where adversaries can
Externí odkaz:
http://arxiv.org/abs/2209.06955
Secure distance measurement and therefore secure Time-of-Arrival (ToA) measurement is critical for applications such as contactless payments, passive-keyless entry and start systems, and navigation systems. This paper initiates the study of Message T
Externí odkaz:
http://arxiv.org/abs/1911.11052
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Published in Quantum Communication and Security, Proceedings, NATO Advanced Research Workshop, edited by M. Zukowski, S. Kilin and J. Kowalik, p. 175-180 (IOS Press, Amsterdam, 2007)
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic
Externí odkaz:
http://arxiv.org/abs/quant-ph/0406147
Publikováno v:
Proceedings of the 32st USENIX Security Symposium
In June 2022, MongoDB released Queryable Encryption (QE), an extension of their flagship database product, enabling keyword searches to be performed over encrypted data. This is the first integration of such searchable encryption technology into a wi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e26fef280ab3cc1ae26ef5874a4696e5
https://hdl.handle.net/20.500.11850/622165
https://hdl.handle.net/20.500.11850/622165
Publikováno v:
Proceedings of the 32st USENIX Security Symposium
We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. We present seven different attacks against the protocol in three different threat m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::65f3c27d693e4278e2a25936330ad9cf
Symmetric Searchable Encryption (SSE) schemes enable keyword searches over encrypted documents. To obtain efficiency, SSE schemes incur a certain amount of leakage. The vast majority of the literature on SSE considers only leakage from one component
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::336449f75e870970d6e27c9acf33399e
https://hdl.handle.net/20.500.11850/564585
https://hdl.handle.net/20.500.11850/564585