Abstract. We apply internal perturbation [3] to the matrix-type cryptosystems [Cn] and HM constructed in [9]. Using small instances of these variants, we investigate the existence ...
Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng ...
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures u...
Carlo Blundo, Emiliano De Cristofaro, Aniello Del ...