Sciweavers

1166 search results - page 46 / 234
» Adaptively Secure Broadcast
Sort
View
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
14 years 3 months ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
CN
2002
87views more  CN 2002»
13 years 10 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
WETICE
2008
IEEE
14 years 5 months ago
An Architecture for an Adaptive and Collaborative Learning Management System in Aviation Security
The importance of aviation security has increased dramatically in recent years. Frequently changing regulations and the need to adapt quickly to new and emerging threats are chall...
Yi Guo, Adrian Schwaninger, Harald Gall
TCC
2005
Springer
166views Cryptology» more  TCC 2005»
14 years 4 months ago
Adaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Ran Canetti, Shai Halevi, Jonathan Katz
CSREASAM
2006
14 years 12 days ago
Adaptive Security Metrics for Computer Systems
The major concern for a computer system is its security and integrity. It is necessary to check the security level of your system and keep it updated. This can be best achieved by ...
Satish Baddelpeli, Gregory Vert