Sciweavers

132 search results - page 3 / 27
» Joint security
Sort
View
CRYPTO
2003
Springer
93views Cryptology» more  CRYPTO 2003»
13 years 11 months ago
Universal Composition with Joint State
Abstract. Cryptographic systems often involve running multiple concurrent instances of some protocol, where the instances have some amount of joint state and randomness. (Examples ...
Ran Canetti, Tal Rabin
CSFW
2008
IEEE
14 years 15 days ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
JCS
2008
88views more  JCS 2008»
13 years 6 months ago
A secure compiler for session abstractions
Compiler for Session Abstractions Ricardo Corin1,2,3, Pierre-Malo Deni
Ricardo Corin, Pierre-Malo Deniélou, C&eacu...
ICIP
2004
IEEE
14 years 7 months ago
Security evaluation for communication-friendly encryption of multimedia
This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic ...
Yinian Mao, Min Wu
ICIW
2009
IEEE
14 years 21 days ago
BOF4WSS: A Business-Oriented Framework for Enhancing Web Services Security for e-Business
When considering Web services’ (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especial...
Jason R. C. Nurse, Jane Sinclair