Sciweavers

930 search results - page 18 / 186
» A Universal Encryption Standard
Sort
View
CN
2006
83views more  CN 2006»
13 years 10 months ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...
CMS
2006
13 years 11 months ago
Selective Encryption for Hierarchical MPEG
Selective encryption of visual data and especially MPEG has attracted a considerable number of researchers in recent years. Scalable visual formats are offering additional function...
Heinz Hofbauer, Thomas Stütz, Andreas Uhl
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
14 years 10 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
ASM
2003
ASM
14 years 3 months ago
Privacy, Abstract Encryption and Protocols: An ASM Model - Part I
d in Abstract State Machines – Advances in Theory and Applications: 10th International Workshop, ASM 2003, volume 2589 of LNCS, Springer–Verlag. Abstract Encryption and Protoco...
Dean Rosenzweig, Davor Runje, Neva Slani
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
14 years 3 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase