143
click to vote
ESORICS
15 years 7 months ago
2004 Springer
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
137
click to vote
ESORICS
15 years 7 months ago
2004 Springer
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
131
click to vote
ESORICS
15 years 7 months ago
2004 Springer
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
129
click to vote
ESORICS
15 years 7 months ago
2004 Springer
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
129
click to vote
ESORICS
15 years 7 months ago
2004 Springer
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
|