Sciweavers

6137 search results - page 999 / 1228
» Securing Collaborative Applications
Sort
View
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
15 years 6 months ago
Implementing Cryptographic Pairings on Smartcards
Abstract. Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations...
Michael Scott, Neil Costigan, Wesam Abdulwahab
EUROPAR
2004
Springer
15 years 6 months ago
Profiling Grid Data Transfer Protocols and Servers
The trend of data intensive grid applications has brought grid storage protocols and servers into focus. The objective of this study is to gain an understanding of how time is spen...
George Kola, Tevfik Kosar, Miron Livny
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
DASC
2006
IEEE
15 years 6 months ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
FOSSACS
2006
Springer
15 years 6 months ago
Guessing Attacks and the Computational Soundness of Static Equivalence
The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence dep...
Martín Abadi, Mathieu Baudet, Bogdan Warins...