Sciweavers

24188 search results - page 95 / 4838
» Computing on Encrypted Data
Sort
View
128
Voted
IJNSEC
2008
147views more  IJNSEC 2008»
15 years 2 months ago
Constructing Efficient Certificateless Public Key Encryption with Pairing
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. Recently, Yum1 and Lee have proposed a generic ser...
Yijuan Shi, Jianhua Li, Jianjun Shi
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 6 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
126
Voted
DEBS
2008
ACM
15 years 4 months ago
Access control in publish/subscribe systems
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...
92
Voted
CSE
2009
IEEE
15 years 3 months ago
Efficient Translation of Algorithmic Kernels on Large-Scale Multi-cores
In this paper we present the design of a novel embedded processor architecture (which we call a
Amit Pande, Joseph Zambreno
111
Voted
CCS
2007
ACM
15 years 9 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor