Sciweavers

221 search results - page 16 / 45
» Unbelievable Security. Matching AES Security Using Public Ke...
Sort
View
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
13 years 9 months ago
Properties of the Discrete Differential with Cryptographic Applications
Abstract. Recently, the Csignature scheme has been completely broken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and other multivariate public key systems hav...
Daniel Smith-Tone
ICARIS
2007
Springer
13 years 11 months ago
Defence Against 802.11 DoS Attacks Using Artificial Immune System
In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security frame...
M. Zubair Shafiq, Muddassar Farooq
CMS
2003
108views Communications» more  CMS 2003»
13 years 8 months ago
Towards an IPv6-Based Security Framework for Distributed Storage Resources
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...
Alessandro Bassi, Julien Laganier
MEDIAFORENSICS
2010
13 years 8 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro