148
click to vote
ESORICS
15 years 8 months ago
2004 Springer
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
144
click to vote
ESORICS
15 years 8 months ago
2004 Springer
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
135
click to vote
ESORICS
15 years 8 months ago
2004 Springer
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
134
click to vote
ESORICS
15 years 8 months ago
2004 Springer
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
133
click to vote
ESORICS
15 years 8 months ago
2004 Springer
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
|