Improved privacy of dynamic group services | 0 | 0.34 | 2017 |
A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes | 8 | 0.49 | 2015 |
Tuple decoders for traitor tracing schemes. | 3 | 0.37 | 2014 |
Optimal suspicion functions for tardos traitor tracing schemes. | 12 | 0.55 | 2013 |
The holey grail A special score function for non-binary traitor tracing | 1 | 0.34 | 2013 |
Faster batch forgery identification. | 6 | 0.51 | 2012 |
Watermarking for adaptive streaming protocols | 1 | 0.36 | 2011 |
An Evaluation Framework for Content Recommender Systems The Industry Perspective | 0 | 0.34 | 2010 |
Embedding renewable cryptographic keys into noisy data | 4 | 0.44 | 2010 |
Computationally efficient searchable symmetric encryption | 26 | 1.51 | 2010 |
Secure pairing with biometrics | 9 | 0.41 | 2009 |
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols | 38 | 1.80 | 2009 |
Embedding Renewable Cryptographic Keys into Continuous Noisy Data | 10 | 0.63 | 2008 |
Trust Management in P2P Systems Using Standard TuLiP. | 6 | 0.44 | 2008 |
Towards an Information Theoretic Analysis of Searchable Encryption | 2 | 0.65 | 2008 |
Controlling leakage of biometric information using dithering | 7 | 0.59 | 2008 |
Fuzzy extractors for continuous distributions. | 28 | 1.35 | 2007 |
Feeling is believing: a secure template exchange protocol | 2 | 0.38 | 2007 |
How robust are gossip-based communication protocols? | 15 | 0.80 | 2007 |
Nonmonotonic Trust Management for P2P Applications | 14 | 0.69 | 2006 |
Survey and benchmark of block ciphers for wireless sensor networks | 61 | 3.15 | 2006 |
LicenseScript: a logical language for digital rights management | 1 | 0.48 | 2006 |
StreamTo: Streaming Content using a Tamper-Resistant Token | 1 | 0.38 | 2005 |
Analysing Password Protocol Security Against Off-line Dictionary Attacks | 31 | 1.15 | 2005 |
Experiments with queries over encrypted data using secret sharing | 1 | 0.37 | 2005 |
Benchmarking block ciphers for wireless sensor networks. | 0 | 0.34 | 2004 |
Efficient Tree Search in Encrypted Data. | 14 | 0.93 | 2004 |
Using Secret Sharing for Searching in Encrypted Data | 20 | 1.13 | 2004 |
License protection with a tamper-resistant token | 3 | 0.43 | 2004 |
On the Security of Digital Signature Schemes Based on Error-Correcting Codes | 2 | 0.48 | 2003 |