Search Results - "Winkler, Severin"
-
1
On the Efficiency of Classical and Quantum Secure Function Evaluation
Published in IEEE transactions on information theory (01-06-2014)“…We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite functions from trusted distributed randomness in the…”
Get full text
Journal Article -
2
Challenges and Prospects for Integrating the Assessment of Health Impacts in the Licensing Process of Large Capital Project in Brazil
Published in International journal of health policy and management (01-10-2018)“…Brazil was one of the first countries in Latin America to institutionalize a National Environmental Policy in 1981, including the environmental impact…”
Get full text
Journal Article -
3
Distilling nonlocality
Published in Physical review letters (27-03-2009)“…Two parts of an entangled quantum state can have a correlation, in their joint behavior under measurements, that is unexplainable by shared classical…”
Get full text
Journal Article -
4
Análise descritiva dos acidentes de trabalho ocorridos em Porto Velho (RO) entre 2002 e 2012
Published in Saúde em Debate“…RESUMO Realizou-se análise descritiva da série histórica de acidentes de trabalho ocorridos entre 2002 e 2012, em Porto Velho (RO), a fim de identificar se…”
Get full text
Journal Article -
5
Impossibility of growing quantum bit commitments
Published in Physical review letters (26-08-2011)“…Quantum key distribution (QKD) is often, more correctly, called key growing. Given a short key as a seed, QKD enables two parties, connected by an insecure…”
Get full text
Journal Article -
6
Insecurity of Quantum Two-Party Computation with Applications to Cheat-Sensitive Protocols and Oblivious Transfer Reductions
Published 20-05-2024“…Oblivious transfer (OT) is a fundamental primitive for secure two-party computation. It is well known that OT cannot be implemented with information-theoretic…”
Get full text
Journal Article -
7
Bit Commitment From Nonsignaling Correlations
Published in IEEE transactions on information theory (01-03-2011)“…Central cryptographic functionalities such as encryption, authentication, or secure two-party computation cannot be realized in an information-theoretically…”
Get full text
Journal Article -
8
On the Efficiency of Classical and Quantum Secure Function Evaluation
Published 08-05-2014“…IEEE Trans. Inf. Th., vol. 60, no. 6, p. 1-21 (2014) We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite…”
Get full text
Journal Article -
9
Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing
Published in 2015 IEEE International Conference on Software Quality, Reliability and Security (01-08-2015)“…Security testing of web applications remains a major problem of software engineering. In order to reveal vulnerabilities, manual and automatic testing…”
Get full text
Conference Proceeding -
10
Análise descritiva dos acidentes de trabalho ocorridos em Porto Velho (RO) entre 2002 e 2012
Published in Saúde em debate (Londrina, Brazil) (01-12-2016)“…RESUMO Realizou-se análise descritiva da série histórica de acidentes de trabalho ocorridos entre 2002 e 2012, em Porto Velho (RO), a fim de identificar se…”
Get full text
Journal Article -
11
Bit Commitment from Non-Signaling Correlations
Published 31-08-2010“…IEEE Transactions on Information Theory, Vol. 57, No. 3, pp. 1770 -1779, 2011 Central cryptographic functionalities such as encryption, authentication, or…”
Get full text
Journal Article -
12
Impossibility of Growing Quantum Bit Commitments
Published 27-09-2011“…Phys. Rev. Lett. 107, 090502 (2011) Quantum key distribution (QKD) is often, more correctly, called key growing. Given a short key as a seed, QKD enables two…”
Get full text
Journal Article -
13
Distilling Non-Locality
Published 05-03-2009“…Phys. Rev. Lett. 102, 120401 (2009) Two parts of an entangled quantum state can have a correlation in their joint behavior under measurements that is…”
Get full text
Journal Article -
14
Towards a Unified Penetration Testing Taxonomy
Published in 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing (01-09-2012)“…Penetration testing is a time consuming process which combines different mechanisms (security standards, protocols, best practices, vulnerability databases,…”
Get full text
Conference Proceeding