Sciweavers

284 search results - page 45 / 57
» A New Key-Insulated Signature Scheme
Sort
View
CVPR
2010
IEEE
14 years 5 months ago
Scalable Face Image Retrieval with Identity-Based Quantization and Multi-Reference Re-ranking
State-of-the-art image retrieval systems achieve scalability by using bag-of-words representation and textual retrieval methods, but their performance degrades quickly in the face...
Zhong Wu, Qifa Ke, Jian Sun, Heung-Yeung Shum
JNW
2008
103views more  JNW 2008»
13 years 9 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
EUROCRYPT
1998
Springer
14 years 1 months ago
Divertible Protocols and Atomic Proxy Cryptography
Abstract. First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property (see Okamoto, Ohta [OO90]). We give a defi...
Matt Blaze, Gerrit Bleumer, Martin Strauss
ETRICS
2006
14 years 1 months ago
Revocable Anonymity
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this...
Stefan Köpsell, Rolf Wendolsky, Hannes Federr...
EUROCRYPT
2010
Springer
14 years 2 months ago
Cryptographic Agility and Its Relation to Circular Encryption
We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, ...
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Ca...