Sciweavers

242 search results - page 43 / 49
» Cryptographic Cloud Storage
Sort
View
VLDB
2004
ACM
105views Database» more  VLDB 2004»
14 years 22 days ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
ASIAN
2003
Springer
115views Algorithms» more  ASIAN 2003»
14 years 19 days ago
Bankable Postage for Network Services
We describe a new network service, the “ticket server”. This service provides “tickets” that a client can attach to a request for a network service (such as sending email o...
Martín Abadi, Andrew Birrell, Michael Burro...
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
13 years 12 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
13 years 11 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam
ATC
2009
Springer
13 years 11 months ago
SAConf: Semantic Attestation of Software Configurations
Remote attestation is one of the key functionalities provided by trusted platforms. Most current attestation approaches are based on cryptographic hash functions, which are appropr...
Hua Wang, Yao Guo, Xiangqun Chen