Sciweavers

72 search results - page 15 / 15
» Secure and Serverless RFID Authentication and Search Protoco...
Sort
View
IEEECIT
2010
IEEE
13 years 2 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
VLDB
2007
ACM
115views Database» more  VLDB 2007»
14 years 5 months ago
NS2: Networked Searchable Store with Correctness
In an outsourced data framework, we introduce and demonstrate mechanisms for securely storing a set of data items (documents) on an un-trusted server, while allowing for subsequen...
Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan K...