Sciweavers

2270 search results - page 80 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
JUCS
2008
143views more  JUCS 2008»
15 years 3 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
142
Voted
ATC
2006
Springer
15 years 5 months ago
Autonomic and Trusted Computing Paradigms
The emerging autonomic computing technology has been hailed by world-wide researchers and professionals in academia and industry. Besides four key capabilities, well known as self-...
Xiaolin Li, Hui Kang, Patrick Harrington, Johnson ...
158
Voted
CCS
2010
ACM
15 years 3 months ago
Practical leakage-resilient identity-based encryption from simple assumptions
We provide new constructions of Leakage-Resilient IdentityBased Encryption systems (IBE) in the Standard model. We apply a hash proof technique in the existing IBE schemes of Bone...
Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rousela...
121
Voted
SOCIALCOM
2010
15 years 1 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
EDO
2005
Springer
15 years 9 months ago
Secure event types in content-based, multi-domain publish/subscribe systems
Publish/subscribe research has so far been mostly focused on efficient event routing, event filtering, and composite event detection. The little research that has been published ...
Lauri I. W. Pesonen, Jean Bacon