Sciweavers

1562 search results - page 140 / 313
» Mathematics, Cryptology, Security
Sort
View
TCC
2005
Springer
166views Cryptology» more  TCC 2005»
14 years 1 months ago
Adaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Ran Canetti, Shai Halevi, Jonathan Katz
FC
2004
Springer
88views Cryptology» more  FC 2004»
14 years 1 months ago
Mental Models of Computer Security
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on t...
L. Jean Camp
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
14 years 5 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
FC
2009
Springer
135views Cryptology» more  FC 2009»
14 years 2 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 2 months ago
The Security of EPC Gen2 Compliant RFID Protocols
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very b...
Mike Burmester, Breno de Medeiros