Sciweavers

2421 search results - page 43 / 485
» Message from the Co-Chairs
Sort
View
IJNSEC
2010
128views more  IJNSEC 2010»
13 years 2 months ago
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu
ICASSP
2011
IEEE
12 years 11 months ago
Detection of anomalous events from unlabeled sensor data in smart building environments
This paper presents a robust unsupervised learning approach for detection of anomalies in patterns of human behavior using multi-modal smart environment sensor data. We model the ...
Padmini Jaikumar, Aca Gacic, Burton Andrews, Micha...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 11 months ago
Online Ciphers from Tweakable Blockciphers
Abstract. Online ciphers are deterministic length-preserving permutations EK : ({0, 1}n )+ → ({0, 1}n )+ where the i-th block of ciphertext depends only on the first i blocks of...
Phillip Rogaway, Haibin Zhang
CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
13 years 9 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
SAC
2006
ACM
13 years 7 months ago
From spontaneous total order to uniform total order: different degrees of optimistic delivery
A total order protocol is a fundamental building block in the construction of distributed fault-tolerant applications. Unfortunately, the implementation of such a primitive can be...
Luís Rodrigues, José Mocito, Nuno Ca...