Sciweavers

65 search results - page 2 / 13
» Property Preserving Symmetric Encryption
Sort
View
ICC
2009
IEEE
246views Communications» more  ICC 2009»
14 years 15 days ago
Symmetric-Key Homomorphic Encryption for Encrypted Data Processing
—The difficulty of processing data in encrypted form has long been the barrier to the widespread use of encryption in data storage applications; improved security or privacy wou...
Aldar Chun-fai Chan
WOWMOM
2009
ACM
142views Multimedia» more  WOWMOM 2009»
14 years 8 days ago
Securing wireless communication with implanted medical devices using reciprocal carrier-phase quantization
Securing wireless communication with resourceconstrained implanted medical devices is considered. A method for refreshing symmetric encryption keys by reciprocal quantization of t...
Gill R. Tsouri
ESORICS
2003
Springer
13 years 11 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
EUSFLAT
2007
131views Fuzzy Logic» more  EUSFLAT 2007»
13 years 7 months ago
Preservation of Graded Properties of Fuzzy Relations by Aggregation Functions
We study graded properties (α–properties) of fuzzy relations, which are parameterized versions of fuzzy relation properties defined by L.A. Zadeh. Namely, we take into account...
Urszula Dudziak
CCS
2010
ACM
13 years 6 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann