Sciweavers

164 search results - page 15 / 33
» Password-Based Encryption Analyzed
Sort
View
CSI
2008
82views more  CSI 2008»
13 years 7 months ago
Efficient and secure protocol in fair document exchange
This paper presents a new fair document exchange protocol based on bilinear pairing with off-line trusted third party (TTP). In such a fair exchange scenario, each party owns a va...
Xiaohui Liang, Zhenfu Cao, Rongxing Lu, Liuquan Qi...
VLSID
2010
IEEE
200views VLSI» more  VLSID 2010»
13 years 6 months ago
Pinpointing Cache Timing Attacks on AES
The paper analyzes cache based timing attacks on optimized codes for Advanced Encryption Standard (AES). The work justifies that timing based cache attacks create hits in the fi...
Chester Rebeiro, Mainack Mondal, Debdeep Mukhopadh...
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 9 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 7 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ICMCS
2007
IEEE
170views Multimedia» more  ICMCS 2007»
14 years 1 months ago
A DRM Architecture for Manageable P2P Based IPTV System
With the improvement of network bandwidth, multimedia services based on streaming live media have gained much attention recently, among which IPTV has become a hot topic. After em...
Xiaoyun Liu, Tiejun Huang, Longshe Huo, Luntian Mo...