Sciweavers

231 search results - page 20 / 47
» Generalized Identity Based and Broadcast Encryption Schemes
Sort
View
ESORICS
2002
Springer
14 years 7 months ago
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones
Network based intrusions have become a serious threat to the users of the Internet. Intruders who wish to attack computers attached to the Internet frequently conceal their identit...
Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu
EUROCRYPT
2001
Springer
14 years 2 days ago
The Bit Security of Paillier's Encryption Scheme and Its Applications
At EuroCrypt’99, Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N-resi...
Dario Catalano, Rosario Gennaro, Nick Howgrave-Gra...
ACNS
2006
Springer
90views Cryptology» more  ACNS 2006»
14 years 1 months ago
Stateful Subset Cover
Abstract. This paper describes a method to convert stateless key revocation schemes based on the subset cover principle into stateful schemes. The main motivation is to reduce the ...
Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm
DBSEC
2007
116views Database» more  DBSEC 2007»
13 years 9 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...
IH
2004
Springer
14 years 29 days ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn