Sciweavers

5722 search results - page 192 / 1145
» Security Function Interactions
Sort
View
ICMCS
2009
IEEE
82views Multimedia» more  ICMCS 2009»
15 years 5 days ago
An interactive video streaming architecture for H.264/AVC compliant players
In this paper, we describe an interactive streaming architecture. The content streamed by this architecture is encoded with the H.264/AVC standard for video compression. The archi...
Etienne Bömcke, Christophe De Vleeschouwer
ENTCS
2008
87views more  ENTCS 2008»
15 years 2 months ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
SCN
2008
Springer
15 years 2 months ago
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
In this paper, we build, in a generic way, two asymmetric cryptosystems with a careful study of their security. We present first an additively homomorphic scheme which generalizes,...
Guilhem Castagnos
CCS
2011
ACM
14 years 2 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
CODASPY
2012
13 years 10 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...