Sciweavers

2108 search results - page 48 / 422
» Encrypted
Sort
View
110
Voted
MFCS
2010
Springer
14 years 11 months ago
A dexptime-Complete Dolev-Yao Theory with Distributive Encryption
In the context of modelling cryptographic tools like blind signatures and homomorphic encryption, the DolevYao model is typically extended with an operator over which encryption i...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
144
Voted
TIP
2010
357views more  TIP 2010»
14 years 11 months ago
Efficient Compression of Encrypted Grayscale Images
—Lossless compression of encrypted sources can be achieved through Slepian-Wolf coding. For encrypted real-world sources such as images, the key to improve the compression effici...
Wei Liu, Wenjun Zeng, Lina Dong, Qiuming Yao
164
Voted
ICDCS
2010
IEEE
14 years 10 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
IACR
2011
122views more  IACR 2011»
14 years 14 days ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
122
Voted
CTRSA
2012
Springer
273views Cryptology» more  CTRSA 2012»
13 years 8 months ago
On the Joint Security of Encryption and Signature in EMV
We provide an analysis of current and future algorithms for signature and encryption in the EMV standards in the case where a single key-pair is used for both signature and encrypt...
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Pat...