Sciweavers

1449 search results - page 44 / 290
» Secure and Efficient Metering
Sort
View
PROVSEC
2010
Springer
15 years 1 months ago
Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm
Generic constructions of designated confirmer signatures follow one of the following two strategies; either produce a digital signature on the message to be signed, then encrypt th...
Laila El Aimani
131
Voted
ACNS
2007
Springer
91views Cryptology» more  ACNS 2007»
15 years 8 months ago
Efficient Content Authentication in Peer-to-Peer Networks
ed Abstract
Roberto Tamassia, Nikos Triandopoulos
CCS
2010
ACM
15 years 4 months ago
Efficient provable data possession for hybrid clouds
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme ...
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Ho...
153
Voted
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
16 years 4 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
ECSA
2010
Springer
15 years 4 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...