Sciweavers

5891 search results - page 46 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
127
Voted
CCS
2007
ACM
15 years 9 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
97
Voted
ERSA
2006
79views Hardware» more  ERSA 2006»
15 years 5 months ago
Searching RC5-Keys with Distributed Reconfigurable Computing
Dirk Koch, Matthiaas Koerber, Jürgen Teich
111
Voted
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
15 years 3 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
129
Voted
IPPS
2006
IEEE
15 years 9 months ago
k-anycast routing schemes for mobile ad hoc networks
— Anycast is a communication paradigm that was first introduced to the suit of routing protocols in IPv6 networks. In anycast, a packet is intended to be delivered to one of the...
Bing Wu, Jie Wu
166
Voted
CODASPY
2012
13 years 11 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...