Sciweavers

1597 search results - page 186 / 320
» Mental Models of Computer Security
Sort
View
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters
127
Voted
ICIC
2009
Springer
15 years 11 months ago
Group-Based Proxy Re-encryption Scheme
Recently, proxy re-encryption scheme received much attention. In this paper, we propose a proxy re-encryption used for divert ciphertext from one group to another. The scheme is bi...
Chunbo Ma, Jun Ao
COMPCON
1994
IEEE
15 years 8 months ago
An Overview of the Spring System
Spring is a highly modular, distributed, object-oriented operating system. This paper describes the goals of the Spring system and provides overviews of the Spring object model, t...
James G. Mitchell, Jonathan Gibbons, Graham Hamilt...
SAC
2006
ACM
15 years 10 months ago
BTS: a Byzantine fault-tolerant tuple space
Generative coordination is one of the most prominent coordination models for implementing open systems due to its spatial and temporal decoupling. Recently, a coordination communi...
Alysson Neves Bessani, Joni da Silva Fraga, Lau Ch...
CCS
2009
ACM
15 years 11 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea