Sciweavers

492 search results - page 35 / 99
» Encrypted Shared Data Spaces
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
ASIACRYPT
2000
Springer
14 years 1 hour ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
BCSHCI
2009
13 years 8 months ago
See the apple of my eye: baby storytelling in social space
People use media-sharing web sites to document their lives and those of their children for maintaining and strengthening social ties with people living away. It is clear then that...
Nazean Jomhari, Victor M. Gonzalez, Sri H. Kurniaw...
ICPR
2010
IEEE
13 years 7 months ago
Activity-Aware Map: Identifying Human Daily Activity Pattern Using Mobile Phone Data
Being able to understand dynamics of human mobility is essential for urban planning and transportation management. Besides geographic space, in this paper, we characterize mobility...
Santi Phithakkitnukoon, Teerayut Horanont, Giusy D...