Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_18
H. Wee
{"title":"Functional Encryption and Its Impact on Cryptography","authors":"H. Wee","doi":"10.1007/978-3-319-10879-7_18","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_18","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123830906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_31
G. Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi
{"title":"Proofs of Space: When Space Is of the Essence","authors":"G. Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi","doi":"10.1007/978-3-319-10879-7_31","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_31","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130429831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-03DOI: 10.1007/978-3-319-10879-7_13
D. Bailey, Markus Dürmuth, C. Paar
{"title":"Statistics on Password Re-use and Adaptive Strength for Financial Accounts","authors":"D. Bailey, Markus Dürmuth, C. Paar","doi":"10.1007/978-3-319-10879-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-10879-7_13","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123328085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-05DOI: 10.1007/978-3-642-32928-9_28
Y. Desmedt, J. Pieprzyk, Ron Steinfeld
{"title":"Active Security in Multiparty Computation over Black-Box Groups","authors":"Y. Desmedt, J. Pieprzyk, Ron Steinfeld","doi":"10.1007/978-3-642-32928-9_28","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_28","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"37 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124524688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-05DOI: 10.1007/978-3-642-32928-9_10
D. Phan, D. Pointcheval, Mario Strefler
{"title":"Decentralized Dynamic Broadcast Encryption","authors":"D. Phan, D. Pointcheval, Mario Strefler","doi":"10.1007/978-3-642-32928-9_10","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_10","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117072249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-05DOI: 10.1007/978-3-642-32928-9_30
S. Erotokritou, Y. Desmedt
{"title":"Human Perfectly Secure Message Transmission Protocols and Their Applications","authors":"S. Erotokritou, Y. Desmedt","doi":"10.1007/978-3-642-32928-9_30","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_30","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"185 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123578769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-05DOI: 10.1007/978-3-642-32928-9_12
V. Kolesnikov, R. Kumaresan
{"title":"Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits","authors":"V. Kolesnikov, R. Kumaresan","doi":"10.1007/978-3-642-32928-9_12","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_12","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131003407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-05DOI: 10.1007/978-3-642-32928-9_15
Seung Geol Choi, D. Dachman-Soled, M. Yung
{"title":"On the Centrality of Off-Line E-Cash to Concrete Partial Information Games","authors":"Seung Geol Choi, D. Dachman-Soled, M. Yung","doi":"10.1007/978-3-642-32928-9_15","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_15","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133102542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-09-05DOI: 10.1007/978-3-642-32928-9_18
Gottfried Herold, Alexander Meurer
{"title":"New Attacks for Knapsack Based Cryptosystems","authors":"Gottfried Herold, Alexander Meurer","doi":"10.1007/978-3-642-32928-9_18","DOIUrl":"https://doi.org/10.1007/978-3-642-32928-9_18","url":null,"abstract":"","PeriodicalId":376645,"journal":{"name":"International Conference on Security and Cryptography for Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129529920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}