142
click to vote
ESORICS
15 years 7 months ago
2004 Springer
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
136
click to vote
ESORICS
15 years 7 months ago
2004 Springer
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
130
click to vote
ESORICS
15 years 7 months ago
2004 Springer
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
127
click to vote
ESORICS
15 years 7 months ago
2004 Springer
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
126
click to vote
ESORICS
15 years 7 months ago
2004 Springer
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
|