Sciweavers

CCS
2015
ACM
9 years 11 months ago
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
The HIVE hidden volume encryption system was proposed by Blass et al. at ACM-CCS 2014. Even though HIVE has a security proof, this paper demonstrates an attack on its implementatio...
Kenneth G. Paterson, Mario Strefler
CCS
2015
ACM
9 years 11 months ago
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext
In this paper we present an identity-set-based broadcast encryption scheme with three working modes: set membership (Include-mode), all member (All-mode), and negative membership ...
Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
CCS
2015
ACM
9 years 11 months ago
Insecurity of Voice Solution VoLTE in LTE Mobile Networks
VoLTE (Voice-over-LTE) is the designated voice solution to the LTE mobile network, and its worldwide deployment is underway. It reshapes call services from the traditional circuit...
Chi-Yu Li, Guan-Hua Tu, Chunyi Peng, Zengwen Yuan,...
CCS
2015
ACM
9 years 11 months ago
Authorization Federation in IaaS Multi Cloud
As more and more organizations move to cloud, it is inevitable that cross-organizational collaboration will need to be supported in the cloud. In this paper, we explore models for...
Navid Pustchi, Ram Krishnan, Ravi S. Sandhu
CCS
2015
ACM
9 years 11 months ago
GRECS: Graph Encryption for Approximate Shortest Distance Queries
We propose graph encryption schemes that efficiently support approximate shortest distance queries on large-scale encrypted graphs. Shortest distance queries are one of the most f...
Xianrui Meng, Seny Kamara, Kobbi Nissim, George Ko...