Sciweavers

5484 search results - page 191 / 1097
» Almost-Everywhere Secure Computation
Sort
View
IACR
2011
149views more  IACR 2011»
14 years 4 months ago
Public Key Encryption for the Forgetful
We investigate public key encryption that allows the originator of a ciphertext to retrieve a “forgotten” plaintext from the ciphertext. This type of public key encryption wit...
Puwen Wei, Yuliang Zheng, Xiaoyun Wang
PET
2012
Springer
13 years 7 months ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter
ICDS
2008
IEEE
15 years 11 months ago
Security Arguments for a Class of ID-Based Signatures
Zhengwei Guo, Xinzheng He, Baocheng Xun
RTSS
2007
IEEE
15 years 10 months ago
Castor: Secure Code Updates Using Symmetric Cryptosystems
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan