Sciweavers

2108 search results - page 124 / 422
» Encrypted
Sort
View
104
Voted
PAIRING
2009
Springer
103views Cryptology» more  PAIRING 2009»
15 years 10 months ago
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
Georg Fuchsbauer, David Pointcheval
89
Voted
GLOBECOM
2008
IEEE
15 years 9 months ago
Inferring Speech Activity from Encrypted Skype Traffic
Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, Chin-Lau...
125
Voted
SECURWARE
2008
IEEE
15 years 9 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
77
Voted
AFRICACRYPT
2008
Springer
15 years 9 months ago
Lower Bounds for Subset Cover Based Broadcast Encryption
Per Austrin, Gunnar Kreitz