KDE Display Manager

Known as: KDM, KDM Display Manager 
KDE Display Manager (KDM) is a display manager (a graphical login program) developed by KDE for the windowing systems X11 and Wayland. KDE Display… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1989-2018
051019892018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Random oracles are powerful cryptographic objects. They facilitate the security proofs of an impressive number of practical… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Yao’s garbled circuit (GC) technique is a powerful cryptographic tool which allows to “encrypt” a circuit $$C$$ C by another… (More)
  • figure 1
Is this relevant?
2012
2012
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in… (More)
Is this relevant?
2012
2012
A key-dependent message (KDM) secure encryption scheme is secure even if an adversary obtains encryptions of messages that depend… (More)
Is this relevant?
2010
2010
In this paper, the problem of force feedback control of kinematically defective manipulators (KDMs) is considered. KDMs are robot… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We construct the rst public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even… (More)
  • table 1
Is this relevant?
2009
2009
We show how to achieve public-key encryption schemes that can securely encrypt nonlinear functions of their own secret key… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of “circular… (More)
Is this relevant?
2007
2007
The project ESONET which is coordinated by IFREMER, France, is a European initiative towards establishing new -and making use of… (More)
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Both the formal and the computational models of cryptography contain the notion of message equivalence or indistinguishability… (More)
Is this relevant?