We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesāthe client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
In this paper we develop an interactive 3D browser for large topographic maps using a visual display augmented by a haptic, or force feedback, display. The extreme size of our dat...
Abstractā Content replication and distribution is an effective technology to reduce the response time for web accesses and has been proven quite popular among large Internet cont...
We construct the ļ¬rst public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...
The role-based access control (RBAC) model has proven to be cost eļ¬ective to reduce the complexity and costs of access permission management. To maximize the advantages oļ¬ered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...