Sciweavers

12 search results - page 1 / 3
» icics 2004
Sort
View
ICICS
2004
Springer
13 years 10 months ago
Time-Scoped Searching of Encrypted Audit Logs
Darren Davis, Fabian Monrose, Michael K. Reiter
ICICS
2004
Springer
13 years 10 months ago
A New Key-Insulated Signature Scheme
In this paper we propose a new strong and perfectly key-insulated signature scheme, more efficient than previous proposals and whose key length is constant and independent of the n...
Nicolás González-Deleito, Olivier Ma...
ICICS
2004
Springer
13 years 10 months ago
On the Minimal Assumptions of Group Signature Schemes
Abstract. One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group sign...
Michel Abdalla, Bogdan Warinschi
ICICS
2004
Springer
13 years 10 months ago
Robust Metering Schemes for General Access Structures
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They sho...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
ICICS
2004
Springer
13 years 10 months ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...