Sciweavers

258 search results - page 20 / 52
» Securing Provenance
Sort
View
144
Voted
GCA
2009
15 years 10 days ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson
126
Voted
CCS
2007
ACM
15 years 8 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
139
Voted
ICPR
2010
IEEE
15 years 15 days ago
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding
In this article, a new fragile, blind, high payload capacity, ROI (Region of Interest) preserving Medical image watermarking (MIW) technique in the spatial domain for grayscale med...
Malay Kumar Kundu, Sudeb Das
ESORICS
2006
Springer
15 years 6 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
113
Voted
EUROCRYPT
2001
Springer
15 years 7 months ago
The Bit Security of Paillier's Encryption Scheme and Its Applications
At EuroCrypt’99, Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N-resi...
Dario Catalano, Rosario Gennaro, Nick Howgrave-Gra...