Sciweavers

258 search results - page 2 / 52
» Securing Provenance
Sort
View
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
13 years 11 months ago
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability ...
Tsz Hon Yuen, Victor K. Wei
IPAW
2010
13 years 3 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
FAST
2009
13 years 3 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
ASIACRYPT
1992
Springer
13 years 9 months ago
Practical Proven Secure Authentication with Arbitration
Yvo Desmedt, Jennifer Seberry
IPAW
2010
13 years 2 months ago
Towards a Threat Model for Provenance in e-Science
Abstract. Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These systems often collect provenance informatio...
Luiz M. R. Gadelha Jr., Marta Mattoso, Michael Wil...