Sciweavers

24 search results - page 1 / 5
» acns 2010
Sort
View
ACNS
2010
Springer
135views Cryptology» more  ACNS 2010»
14 years 2 months ago
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
ACNS
2010
Springer
125views Cryptology» more  ACNS 2010»
14 years 3 months ago
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption
Aurélie Bauer, Jean-Sébastien Coron,...
ACNS
2010
Springer
120views Cryptology» more  ACNS 2010»
14 years 2 months ago
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai ...
ACNS
2010
Springer
155views Cryptology» more  ACNS 2010»
14 years 2 months ago
Redactable Signatures for Tree-Structured Data: Definitions and Constructions
ded abstract of this paper appears in Applied Cryptography and Network Security
Christina Brzuska, Heike Busch, Özgür Da...
ACNS
2010
Springer
114views Cryptology» more  ACNS 2010»
14 years 2 months ago
Two New Efficient PIR-Writing Protocols
Assume that a client outsources his database to a remote storage-provider (the server), so that for privacy reasons, the client's database is encrypted by his secret key. Duri...
Helger Lipmaa, Bingsheng Zhang