×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [negligible probability]
Robust Sender Anonymity Tamara Rezk FMCrypto (work in progress) G.Barthe, A.Hevia, Z.Luo, T.Rezk, B.Warinschi April, 28 th – Campinas, Brazil
213 views
Signature from One-way Functions
167 views
Secret-Ballot Receipts True Voter-Verifiable Elections David Chaum
233 views
Motion-MIX Mobile Traffic Sensor Network vs. Motion-MIX : Tracing & Protecting Mobile Wireless Nodes # Jiejun Kong, # # Jiejun Kong, * Dapeng Wu, + Xiaoyan
217 views
Modeling Ad-hoc Rushing Attack in a Negligiblity -based Security Framework Jiejun Kong Mario Gerla Jiejun Kong, * Xiaoyan Hong, # Mario Gerla Scalable
223 views
LECTURE 4 Data Integrity & Authentication Message Authentication Codes (MACs)
252 views
Transversity 2014 Closing Remarks: Moving Forward in the Era of Quantitative QCD Christine A. Aidala University of Michigan Chia, Italy June 13, 2014
213 views
Cryptography Lecture 12 Arpita Patra. In PK setting, privacy is provided by PKE Digital Signatures Integrity/authenticity is provided by digital signatures
214 views
More “normal” than Normal: Scaling distributions in complex systems
36 views
Valid Policies for Secure Key Management GUILLAUME SCERRI AND RYAN STANLEY-OAKES, UNIVERSITY OF BRISTOL
218 views
On the Cryptographic Complexity of the Worst Functions Amos Beimel (BGU) Yuval Ishai (Technion) Ranjit Kumaresan (Technion) Eyal Kushilevitz (Technion)
228 views
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
50 views
Next >