Sciweavers

IEEEIAS
2009
IEEE
13 years 8 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng
ESORICS
2010
Springer
13 years 8 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
TIP
2010
357views more  TIP 2010»
13 years 9 months ago
Efficient Compression of Encrypted Grayscale Images
—Lossless compression of encrypted sources can be achieved through Slepian-Wolf coding. For encrypted real-world sources such as images, the key to improve the compression effici...
Wei Liu, Wenjun Zeng, Lina Dong, Qiuming Yao
ICMCS
2010
IEEE
260views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Compressed-encrypted domain JPEG2000 image watermarking
In digital rights management (DRM) systems, digital media is often distributed by multiple levels of distributors in a compressed and encrypted format. The distributors in the cha...
A. V. Subramanyam, Sabu Emmanuel, Mohan S. Kankanh...
DBSEC
2006
134views Database» more  DBSEC 2006»
14 years 7 days ago
Aggregation Queries in the Database-As-a-Service Model
In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, ...
Einar Mykletun, Gene Tsudik
DBSEC
2008
196views Database» more  DBSEC 2008»
14 years 9 days ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
CCS
2006
ACM
14 years 2 months ago
Privacy-preserving semantic interoperation and access control of heterogeneous databases
Today, many applications require users from one organization to access data belonging to organizations. While traditional solutions offered for the federated and mediated database...
Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalak...
ACISP
1998
Springer
14 years 3 months ago
Detecting Key-Dependencies
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposu...
Tage Stabell-Kulø, Arne Helme, Gianluca Din...
WISA
2004
Springer
14 years 4 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
PET
2005
Springer
14 years 4 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...