121
click to vote
ESORICS
15 years 5 months ago
2004 Springer
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
111
click to vote
ESORICS
15 years 5 months ago
2004 Springer
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
107
click to vote
ESORICS
15 years 5 months ago
2004 Springer
We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). ...
104
click to vote
ESORICS
15 years 5 months ago
2004 Springer
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
103
click to vote
ESORICS
15 years 5 months ago
2004 Springer
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
|