Sciweavers

2108 search results - page 41 / 422
» Encrypted
Sort
View
116
Voted
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 1 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
109
Voted
ISW
2007
Springer
15 years 7 months ago
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability
Abstract. The concept of timed-released encryption with pre-open capability (TRE-PC) was introduced by Hwang, Yum and Lee. In a TREPC scheme, a message is encrypted in such a way t...
Alexander W. Dent, Qiang Tang
102
Voted
ICMCS
2006
IEEE
128views Multimedia» more  ICMCS 2006»
15 years 6 months ago
On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT)
This paper addresses the security issues of the multimedia encryption schemes based on multiple Huffman table (MHT). A detailed analysis of known-plaintext attack is presented to ...
Jiantao Zhou, Zhiqin Liang, Yan Chen, Oscar C. Au
SDMW
2005
Springer
15 years 6 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
93
Voted
CRYPTO
2004
Springer
121views Cryptology» more  CRYPTO 2004»
15 years 6 months ago
A New Paradigm of Hybrid Encryption Scheme
In this paper, we show that a key encapsulation mechanism (KEM) does not have to be IND-CCA secure in the construction of hybrid encryption schemes, as was previously believed. Tha...
Kaoru Kurosawa, Yvo Desmedt