Sciweavers

8644 search results - page 51 / 1729
» On the Composition of Secure Systems
Sort
View
IACR
2011
84views more  IACR 2011»
12 years 7 months ago
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
In this paper, we explore a general methodology for converting composite order pairingbased cryptosystems into the prime order setting. We employ the dual pairing vector space app...
Allison B. Lewko
ASIACRYPT
2000
Springer
14 years 2 days ago
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such ...
Mihir Bellare, Chanathip Namprempre
ASIACRYPT
2003
Springer
14 years 29 days ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu
GCC
2003
Springer
14 years 28 days ago
Research on Security Architecture and Protocols of Grid Computing System
This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstra...
Xiangming Fang, Shoubao Yang, Leitao Guo, Lei Zhan...
CVPR
2007
IEEE
14 years 9 months ago
Learning the Compositional Nature of Visual Objects
The compositional nature of visual objects significantly limits their representation complexity and renders learning of structured object models tractable. Adopting this modeling ...
Björn Ommer, Joachim M. Buhmann