Search Results - "Winkler, Severin"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    On the Efficiency of Classical and Quantum Secure Function Evaluation by Winkler, Severin, Wullschleger, Jurg

    Published in IEEE transactions on information theory (01-06-2014)
    “…We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite functions from trusted distributed randomness in the…”
    Get full text
    Journal Article
  2. 2

    Challenges and Prospects for Integrating the Assessment of Health Impacts in the Licensing Process of Large Capital Project in Brazil by de Souza Hacon, Sandra, Périssé, André Reynaldo Santos, Simos, Jean, Cantoreggi, Nicola Luca, Winkler, Mirko Severin

    “…Brazil was one of the first countries in Latin America to institutionalize a National Environmental Policy in 1981, including the environmental impact…”
    Get full text
    Journal Article
  3. 3

    Distilling nonlocality by Forster, Manuel, Winkler, Severin, Wolf, Stefan

    Published in Physical review letters (27-03-2009)
    “…Two parts of an entangled quantum state can have a correlation, in their joint behavior under measurements, that is unexplainable by shared classical…”
    Get full text
    Journal Article
  4. 4

    Análise descritiva dos acidentes de trabalho ocorridos em Porto Velho (RO) entre 2002 e 2012 by Carlos Alexandre Rodrigues Pereira, Mirko Severin Winkler, Sandra de Souza Hacon

    Published in Saúde em Debate
    “…RESUMO Realizou-se análise descritiva da série histórica de acidentes de trabalho ocorridos entre 2002 e 2012, em Porto Velho (RO), a fim de identificar se…”
    Get full text
    Journal Article
  5. 5

    Impossibility of growing quantum bit commitments by Winkler, Severin, Tomamichel, Marco, Hengl, Stefan, Renner, Renato

    Published in Physical review letters (26-08-2011)
    “…Quantum key distribution (QKD) is often, more correctly, called key growing. Given a short key as a seed, QKD enables two parties, connected by an insecure…”
    Get full text
    Journal Article
  6. 6

    Insecurity of Quantum Two-Party Computation with Applications to Cheat-Sensitive Protocols and Oblivious Transfer Reductions by Hänggi, Esther, Winkler, Severin

    Published 20-05-2024
    “…Oblivious transfer (OT) is a fundamental primitive for secure two-party computation. It is well known that OT cannot be implemented with information-theoretic…”
    Get full text
    Journal Article
  7. 7

    Bit Commitment From Nonsignaling Correlations by Winkler, Severin, Wullschleger, Jürg, Wolf, Stefan

    Published in IEEE transactions on information theory (01-03-2011)
    “…Central cryptographic functionalities such as encryption, authentication, or secure two-party computation cannot be realized in an information-theoretically…”
    Get full text
    Journal Article
  8. 8

    On the Efficiency of Classical and Quantum Secure Function Evaluation by Winkler, Severin, Wullschleger, Jürg

    Published 08-05-2014
    “…IEEE Trans. Inf. Th., vol. 60, no. 6, p. 1-21 (2014) We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite…”
    Get full text
    Journal Article
  9. 9

    Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing by Bozic, Josip, Garn, Bernhard, Kapsalis, Ioannis, Simos, Dimitris, Winkler, Severin, Wotawa, Franz

    “…Security testing of web applications remains a major problem of software engineering. In order to reveal vulnerabilities, manual and automatic testing…”
    Get full text
    Conference Proceeding
  10. 10

    Análise descritiva dos acidentes de trabalho ocorridos em Porto Velho (RO) entre 2002 e 2012 by Pereira, Carlos Alexandre Rodrigues, Winkler, Mirko Severin, Hacon, Sandra de Souza

    Published in Saúde em debate (Londrina, Brazil) (01-12-2016)
    “…RESUMO Realizou-se análise descritiva da série histórica de acidentes de trabalho ocorridos entre 2002 e 2012, em Porto Velho (RO), a fim de identificar se…”
    Get full text
    Journal Article
  11. 11

    Bit Commitment from Non-Signaling Correlations by Winkler, Severin, Wullschleger, Juerg, Wolf, Stefan

    Published 31-08-2010
    “…IEEE Transactions on Information Theory, Vol. 57, No. 3, pp. 1770 -1779, 2011 Central cryptographic functionalities such as encryption, authentication, or…”
    Get full text
    Journal Article
  12. 12

    Impossibility of Growing Quantum Bit Commitments by Winkler, Severin, Tomamichel, Marco, Hengl, Stefan, Renner, Renato

    Published 27-09-2011
    “…Phys. Rev. Lett. 107, 090502 (2011) Quantum key distribution (QKD) is often, more correctly, called key growing. Given a short key as a seed, QKD enables two…”
    Get full text
    Journal Article
  13. 13

    Distilling Non-Locality by Forster, Manuel, Winkler, Severin, Wolf, Stefan

    Published 05-03-2009
    “…Phys. Rev. Lett. 102, 120401 (2009) Two parts of an entangled quantum state can have a correlation in their joint behavior under measurements that is…”
    Get full text
    Journal Article
  14. 14

    Towards a Unified Penetration Testing Taxonomy by Hudic, A., Zechner, L., Islam, S., Krieg, C., Weippl, E. R., Winkler, S., Hable, R.

    “…Penetration testing is a time consuming process which combines different mechanisms (security standards, protocols, best practices, vulnerability databases,…”
    Get full text
    Conference Proceeding