Sciweavers

6137 search results - page 122 / 1228
» Securing Collaborative Applications
Sort
View
ASWC
2006
Springer
13 years 11 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
CSREASAM
2006
13 years 10 months ago
Flexible Cryptographic Component Design for Secure Web Applications
- Although Internet serves many contents and services, it has serious problems of security: the invasion of privacy, hacking and etc. To prevent these problems, two implementations...
Tae Ho Kim, Jong Jin Kim, Chang Hoon Kim, Chun Pyo...
ICS
2010
Tsinghua U.
14 years 6 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
ASIACRYPT
2009
Springer
14 years 3 months ago
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
We present a new construction of non-committing encryption schemes. Unlike the previous constructions of Canetti et al. (STOC ’96) and of Damg˚ard and Nielsen (Crypto ’00), ou...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...
EUROCRYPT
2001
Springer
14 years 1 months ago
The Bit Security of Paillier's Encryption Scheme and Its Applications
At EuroCrypt’99, Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N-resi...
Dario Catalano, Rosario Gennaro, Nick Howgrave-Gra...