Sciweavers

6907 search results - page 1 / 1382
» Securing distributed adaptation
Sort
View
CN
2002
87views more  CN 2002»
13 years 4 months ago
Securing distributed adaptation
Open architecture networks provide applications with fine-grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond th...
Jun Li, Mark Yarvis, Peter L. Reiher
TPDS
2008
262views more  TPDS 2008»
13 years 4 months ago
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is...
Yunhua Koglin, Danfeng Yao, Elisa Bertino
TCC
2004
Springer
131views Cryptology» more  TCC 2004»
13 years 10 months ago
Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems
Recently Canetti, Krawczyk and Nielsen defined the notion of replayable adaptive chosen ciphertext attack (RCCA) secure encryption. Essentially a cryptosystem that is RCCA secure ...
Jens Groth
ASIACRYPT
2001
Springer
13 years 9 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert