Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Stelios Erotokritou"'
Autor:
Yvo Desmedt, Stelios Erotokritou
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319222691
VOTE-ID
VOTE-ID
It is clear to the public that when it comes to privacy, computers and "secure" communication over the Internet cannot fully be trusted. Chaum introduced code voting as a solution for using a possibly infected-by-malware device to cast a vote in an e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::64a13f101b12b08b1239991dbed871e1
https://doi.org/10.1007/978-3-319-22270-7_7
https://doi.org/10.1007/978-3-319-22270-7_7
Autor:
Stelios Erotokritou, Yvo Desmedt
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642329272
SCN
SCN
Perfectly secure message transmission (PSMT) schemes have been studied in the field of cryptography for nearly 20 years. In this paper we introduce a new aspect to PSMT. We consider the case when the hardware/software used by the receiver might be co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79d0eaf8124ba4219cacc459012d9c26
https://doi.org/10.1007/978-3-642-32928-9_30
https://doi.org/10.1007/978-3-642-32928-9_30
Publikováno v:
ICPP Workshops
In this work we focus on solutions to an emerging threat to cloud-based services – namely that of data seizures within a shared multiple customer architecture. We focus on the problem of securing distributed data storage in a cloud computing enviro
Publikováno v:
Progress in Cryptology – AFRICACRYPT 2010 ISBN: 9783642126772
AFRICACRYPT
AFRICACRYPT
Recently Kurosawa and Suzuki considered almost secure (1-phase n-channel) message transmission when n=(2t+1). The authors gave a lower bound on the communication complexity and presented an exponential time algorithm achieving this bound. In this pap
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3e5eaccb1e953e4ed6f48b0ef7bd4580
https://doi.org/10.1007/978-3-642-12678-9_11
https://doi.org/10.1007/978-3-642-12678-9_11
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015. The 10 revised full papers presented, including one keynote
Autor:
Ivan Visconti, Roberto De Prisco
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submission