Sciweavers

2108 search results - page 162 / 422
» Encrypted
Sort
View
127
Voted
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 7 months ago
Secure Multiparty AES
Abstract We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expe...
Ivan Damgård, Marcel Keller
120
Voted
CNSR
2009
IEEE
102views Communications» more  CNSR 2009»
15 years 7 months ago
Online Classification of Network Flows
Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we prop...
Mahbod Tavallaee, Wei Lu, Ali A. Ghorbani
133
Voted
CCS
2006
ACM
15 years 7 months ago
A fully collusion resistant broadcast, trace, and revoke system
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems...
Dan Boneh, Brent Waters
151
Voted
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
15 years 7 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller
170
Voted
CCS
2008
ACM
15 years 5 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim