Sciweavers

615 search results - page 65 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 2 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
ISMIR
2004
Springer
176views Music» more  ISMIR 2004»
14 years 2 months ago
The International Music Information Retrieval Systems Evaluation Laboratory: Governance, Access and Security
The IMIRSEL (International Music Information Retrieval Systems Evaluation Laboratory) project provides an unprecedented platform for evaluating Music Information Retrieval (MIR) a...
J. Stephen Downie, Joe Futrelle, David K. Tcheng
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 10 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
ICIP
2005
IEEE
14 years 10 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...