Sciweavers

2108 search results - page 32 / 422
» Encrypted
Sort
View
112
Voted
ASIACRYPT
2009
Springer
15 years 9 months ago
Group Encryption: Non-interactive Realization in the Standard Model
Group encryption (GE) schemes, introduced at Asiacrypt’07, are an encryption analogue of group signatures with a number of interesting applications. They allow a sender to encryp...
Julien Cathalo, Benoît Libert, Moti Yung
104
Voted
AINA
2007
IEEE
15 years 9 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
135
Voted
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
15 years 9 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 9 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
121
Voted
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
15 years 8 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra