At Eurocrypt 2005, Boneh, Boyen and Goh presented a constant size ciphertext hierarchical identity based encryption (HIBE) protocol. Our main contribution is to present a variant ...
Abstract. The Resource Description Framework (RDF) provides a common data model for the integration of emerging "real-time" streams of social and sensor data with the Web...
Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different pro...
This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-rel...
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...