Sciweavers

623 search results - page 41 / 125
» A proposal for Ontology Security Standards
Sort
View
ICIC
2009
Springer
14 years 3 months ago
Group-Based Proxy Re-encryption Scheme
Recently, proxy re-encryption scheme received much attention. In this paper, we propose a proxy re-encryption used for divert ciphertext from one group to another. The scheme is bi...
Chunbo Ma, Jun Ao
BMCBI
2006
207views more  BMCBI 2006»
13 years 9 months ago
A new measure for functional similarity of gene products based on Gene Ontology
Background: Gene Ontology (GO) is a standard vocabulary of functional terms and allows for coherent annotation of gene products. These annotations provide a basis for new methods ...
Andreas Schlicker, Francisco S. Domingues, Jö...
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
14 years 3 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Secure Hybrid Encryption from Weakened Key Encapsulation
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmet...
Dennis Hofheinz, Eike Kiltz
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
14 years 2 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz