Sciweavers

24 search results - page 5 / 5
» Attribute-Based Broadcast Encryption Scheme Made Efficient
Sort
View
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
13 years 8 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor
EUROCRYPT
2009
Springer
14 years 5 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
P2P
2002
IEEE
178views Communications» more  P2P 2002»
13 years 9 months ago
A Scalable and Ontology-Based P2P Infrastructure for Semantic Web Services
Semantic Web Services are a promising combination of Semantic Web and Web service technology, aiming at providing means of automatically executing, discovering and composing seman...
Mario T. Schlosser, Michael Sintek, Stefan Decker,...
CODASPY
2012
12 years 6 days ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...