Filters








1,019 Hits in 6.0 sec

Page 6573 of Mathematical Reviews Vol. , Issue 99i [page]

<span title="">1999</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
other applications (105-120); Matthias Fitzi, Martin Hirt and Ueli Maurer, Trading correctness for privacy in unconditional multi-party computation (extended abstract) (121-136); William Aiello, Sachin  ...  Lodha and Rafail Ostrovsky, Fast digital identity revocation (extended abstract) (137-152).  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_1999-09_99i/page/6573" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_1999-09_99i/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Hybrid-secure MPC

Christoph Lucas, Dominik Raub, Ueli Maurer
<span title="">2010</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/t5fzg7fyy5byfdcl2vrzbn43ty" style="color: black;">Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing - PODC &#39;10</a> </i> &nbsp;
IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t < n 2 , and computationally secure with agreement on abort (privacy and correctness  ...  Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted parties is below a certain  ...  Acknowledgements We would like to thank Björn Tackmann and Stefano Tessaro for their valuable feedback and interesting discussions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1835698.1835747">doi:10.1145/1835698.1835747</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/podc/LucasRM10.html">dblp:conf/podc/LucasRM10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4joxc7e5kzgzjk35va6wqlnkqy">fatcat:4joxc7e5kzgzjk35va6wqlnkqy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151022134227/http://eprint.iacr.org/2009/009.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/68/a0/68a060faaa096680a3483cf9423943a104a60a27.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1835698.1835747"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions

Yuhong Liu, Yan Lindsay Sun, Jungwoo Ryoo, Syed Rizvi, Athanasios V. Vasilakos
<span title="2015-09-30">2015</span> <i title="Korean Institute of Information Scientists and Engineers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xvozmuuqprbr3mvk4th3ep6pea" style="color: black;">Journal of Computing Science and Engineering</a> </i> &nbsp;
In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research  ...  While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm.  ...  The involvement of diverse parties in the cloud makes the security/privacy issues complicated since security objectives for different parties can be very different, and sometimes these objectives may even  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5626/jcse.2015.9.3.119">doi:10.5626/jcse.2015.9.3.119</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/d3xbvd7t3zfkxadhljp5jn2obq">fatcat:d3xbvd7t3zfkxadhljp5jn2obq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180724081437/http://www.ndsl.kr/soc_img/society/kiss/E1EIKI/2015/v9n3/E1EIKI_2015_v9n3_119.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/db/d6/dbd6deb9ae31613628a4a2a5df2d97130d874d7e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5626/jcse.2015.9.3.119"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography [article]

Mario Milicevic, Chen Feng, Lei M. Zhang, P. Glenn Gulak
<span title="2017-04-17">2017</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Multi-edge low-density parity-check (LDPC) codes with low code rates and long block lengths were proposed for CV-QKD, in order to extend the maximum reconciliation distance between the two remote parties  ...  The speed at which two remote parties can exchange secret keys over a fixed-length fiber-optic cable in continuous-variable quantum key distribution (CV-QKD) is currently limited by the computational complexity  ...  at the University of York for introducing the upper bound on secret key rate for lossy channels, and Dr.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1702.07740v2">arXiv:1702.07740v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gztdowdmmnfc5fgz2jdjxmeyfa">fatcat:gztdowdmmnfc5fgz2jdjxmeyfa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191026120459/https://arxiv.org/pdf/1702.07740v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/25/5d/255d6d1b4de1f23dfe4a2b7df5596ab2f04cdde6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1702.07740v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining [chapter]

Dan Bogdanov, Roman Jagomägis, Sven Laur
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Furthermore, there are no established tools for applying secure multi-party computation in real-world applications.  ...  Such tasks can be solved with secure multi-party computation (MPC) techniques. However, practitioners tend to consider such solutions inefficient.  ...  Therefore, a data mining expert does not have to be a cryptography expert to use SHAREMIND and SECREC for creating privacy-preserving data mining applications.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-30428-6_9">doi:10.1007/978-3-642-30428-6_9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xnatn2zo4ffythvc3gwmw4aype">fatcat:xnatn2zo4ffythvc3gwmw4aype</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811201815/https://cyber.ee/uploads/2013/04/universal-ppdm-sdk.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6c/13/6c13367b99656196b079f167f62f279d3ee070ca.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-30428-6_9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Revocable Privacy: Principles, Use Cases, and Technologies [chapter]

Wouter Lueks, Maarten H. Everts, Jaap-Henk Hoepman
<span title="">2016</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, we revisit the design principle of revocable privacy which guides the creation of systems that offer anonymity for people who do not violate a predefined rule, but can still have consequences  ...  Second, we explore some use cases that can benefit from a revocable privacy approach. For each of these, we derive the underlying abstract rule that users should follow.  ...  The comparison between the abstract rules and existing revocable privacy techniques identifies interesting directions of future work in the area of revocable privacy.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-31456-3_7">doi:10.1007/978-3-319-31456-3_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fjkk5ul2dbfdli4njuhdghbjaa">fatcat:fjkk5ul2dbfdli4njuhdghbjaa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190223163322/http://pdfs.semanticscholar.org/49f5/756051d3a7c277aed6bb1e10dbc86614a148.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/49/f5/49f5756051d3a7c277aed6bb1e10dbc86614a148.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-31456-3_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Privacy-preserving solutions for Blockchain: review and challenges

Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
<span title="">2019</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
To deal with these challenges, novel privacy-preserving solutions for blockchain based on crypto-privacy techniques are emerging to empower users with mechanisms to become anonymous and take control of  ...  The survey covers privacy techniques in public and permissionless blockchains, e.g.  ...  Table 1 summarizes the cryptographic privacy solutions that are explained in the following subsections. 1) SECURE MULTI-PARTY COMPUTATION (SMPC) Secure multi-party computation (SMPC) [26] splits data  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2950872">doi:10.1109/access.2019.2950872</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kf2rl7onmrbvnozjudspxrcatu">fatcat:kf2rl7onmrbvnozjudspxrcatu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107171127/https://ieeexplore.ieee.org/ielx7/6287639/8600701/08888155.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d0/7d/d07dc21c40a49b3dc8275176e5948b742ca47af8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2950872"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Privacy and verifiability in voting systems: Methods, developments and trends

Hugo Jonker, Sjouke Mauw, Jun Pang
<span title="">2013</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/x3ibtg2oifh47c73tgo66gjrw4" style="color: black;">Computer Science Review</a> </i> &nbsp;
One of the most challenging aspects in computer-supported voting is to combine the apparently conflicting requirements of privacy and verifiability.  ...  As more and more refined voting systems were proposed, understanding of first privacy and later verifiability in voting increased, and notions of privacy as well as notions of verifiability in voting became  ...  In addition, we are grateful for comments on early drafts of this work by Peter Y. A.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.cosrev.2013.08.002">doi:10.1016/j.cosrev.2013.08.002</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fjqritngvnej3owtqnmhbuckqa">fatcat:fjqritngvnej3owtqnmhbuckqa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171220151814/http://satoss.uni.lu/members/sjouke/papers/JMP13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ef/cd/efcd1188de7c51e729c42adea4afb5d836d99e72.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.cosrev.2013.08.002"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Private search on key-value stores with hierarchical indexes

Haibo Hu, Jianliang Xu, Xizhong Xu, Kexin Pei, Byron Choi, Shuigeng Zhou
<span title="">2014</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vuw5ktdyknehrehttg5qm4rfqm" style="color: black;">2014 IEEE 30th International Conference on Data Engineering</a> </i> &nbsp;
Although secure multiparty computation (SMC) is a suitable computing paradigm for this problem, it has significant computation and communication overheads, thus unable to scale up to large datasets.  ...  Query processing that preserves both the query privacy at the client and the data privacy at the server is a new research problem.  ...  Section VII extends to R-tree index and multi-dimensional data.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icde.2014.6816687">doi:10.1109/icde.2014.6816687</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icde/HuXXPCZ14.html">dblp:conf/icde/HuXXPCZ14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wpb63gvmsrfaxoxb7fnrsxnbbe">fatcat:wpb63gvmsrfaxoxb7fnrsxnbbe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809074801/http://www.comp.hkbu.edu.hk/~xujl/Papers/icde2014.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/93/f5/93f504d3520eacc5dfab0ee36e6f2203056d8aa3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icde.2014.6816687"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Adapting Helios for Provable Ballot Privacy [chapter]

David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
<span title="">2011</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Our first contribution is a model for the property known as ballot privacy that generalizes and extends several existing ones.  ...  In this paper we study the security of Helios using computational models.  ...  Acknowledgements We are very grateful to Ben Adida for helpful discussions on how to enhance ballot privacy in Helios. This  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-23822-2_19">doi:10.1007/978-3-642-23822-2_19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/spwrsay575fpndsyfxktgiqz24">fatcat:spwrsay575fpndsyfxktgiqz24</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120712153044/http://www.lsv.ens-cachan.fr/Projects/anr-avote/PUBLIS/BCPSW-esorics11.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/65/2b/652b08d943cb7eb9a0d2ae131096532060d79473.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-23822-2_19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Asynchronous verifiable secret sharing and proactive cryptosystems

Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
<span title="">2002</span> <i title="ACM Press"> Proceedings of the 9th ACM conference on Computer and communications security - CCS &#39;02 </i> &nbsp;
It yields the first asynchronous Byzantine agreement protocol in the standard model whose efficiency makes it suitable for use in practice.  ...  The second part of this paper introduces proactive cryptosystems in asynchronous networks and presents an efficient protocol for refreshing the shares of a secret key for discrete logarithm-based sharings  ...  Our definition provides computational correctness and unconditional privacy.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/586123.586124">doi:10.1145/586123.586124</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cewp7oefhzct7bn52umtc7rbli">fatcat:cewp7oefhzct7bn52umtc7rbli</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829193950/http://home.eng.iastate.edu/~daji/seminar/papers/CKLS02.ACMCCS.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/20/f420f29ee1443e67cebfa79309af7ec19e94e6a2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/586123.586124"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Asynchronous verifiable secret sharing and proactive cryptosystems

Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl
<span title="">2002</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 9th ACM conference on Computer and communications security - CCS &#39;02</a> </i> &nbsp;
It yields the first asynchronous Byzantine agreement protocol in the standard model whose efficiency makes it suitable for use in practice.  ...  The second part of this paper introduces proactive cryptosystems in asynchronous networks and presents an efficient protocol for refreshing the shares of a secret key for discrete logarithm-based sharings  ...  Our definition provides computational correctness and unconditional privacy.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/586110.586124">doi:10.1145/586110.586124</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/CachinKLS02.html">dblp:conf/ccs/CachinKLS02</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qdtmfrdg2ra2fk6kzfqsppa4g4">fatcat:qdtmfrdg2ra2fk6kzfqsppa4g4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829193950/http://home.eng.iastate.edu/~daji/seminar/papers/CKLS02.ACMCCS.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/20/f420f29ee1443e67cebfa79309af7ec19e94e6a2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/586110.586124"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Cryptographic Protocols under Quantum Attacks [article]

Carolin Lunemann
<span title="2011-02-09">2011</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction.  ...  The realm of this thesis is cryptographic protocol theory in the quantum world.  ...  Acknowledgments Thanks to all the people, I met on the way of my PhD education, for introducing me to new ways of thinking, inspiring me by fascinating ideas, and helping me in so many other ways.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1102.0885v2">arXiv:1102.0885v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y4ytrigbzzf3vb7pwxw3skoh4u">fatcat:y4ytrigbzzf3vb7pwxw3skoh4u</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-1102.0885/1102.0885.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1102.0885v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Quantum Cryptography [article]

Hoi-Kwong Lo, Yi Zhao
<span title="2008-04-01">2008</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
There is no abstract for this review article.  ...  So far there have been limited studies on multi-party QKD. Notice that there are many deep unresolved problems in multi-party entanglement.  ...  It would be interesting to study more deeply multi-party QKD and understand better its connection to multi-party entanglement.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/0803.2507v4">arXiv:0803.2507v4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xaar4d26pbh7lnflqd4vboq6me">fatcat:xaar4d26pbh7lnflqd4vboq6me</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-0803.2507/0803.2507.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/c6/bfc6dadbcc1e8b1fa012b4679f77f96b120a2e55.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/0803.2507v4" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

More than modelling and hiding: towards a comprehensive view of Web mining and privacy

Bettina Berendt
<span title="2012-02-15">2012</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ja54f4dcmzfz7cvlo7o757jdba" style="color: black;">Data mining and knowledge discovery</a> </i> &nbsp;
The data mining community has been very conscious of these issues and has addressed in particular the inference problems through various methods for "privacy-preserving data mining" and "privacy-preserving  ...  Over the last decade, privacy has been widely recognised as one of the major problems of data collections in general and the Web in particular.  ...  Solutions mainly come from PPDM and from secure multi-party computation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10618-012-0254-1">doi:10.1007/s10618-012-0254-1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bbjljvu65jgirdeifpnadmzgxe">fatcat:bbjljvu65jgirdeifpnadmzgxe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171127091748/https://core.ac.uk/download/pdf/34540051.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5f/7c/5f7cadc004322ffaa382cdfdbbc529bd28522ccb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10618-012-0254-1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 1,019 results