Sciweavers

2108 search results - page 97 / 422
» Encrypted
Sort
View
ENTCS
2007
102views more  ENTCS 2007»
15 years 3 months ago
Selective Data Encryption in Outsourced Dynamic Environments
The amount of information held by organizations’ databases is increasing very quickly. A recently proposed solution to the problem of data management, which is becoming increasi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
190
Voted
CLUSTER
1999
IEEE
15 years 2 months ago
Experimental measurements and design guidelines for real-time software encryption in multimedia wireless LANs
To secure interactive multimedia applications in wireless LANs WLANs it is pertinent to implement real time cryptographic services. In this paper we evaluate the use of software b...
Aura Ganz, Se Hyun Park, Zvi Ganz
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
15 years 1 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
IJNSEC
2010
133views more  IJNSEC 2010»
14 years 10 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji
153
Voted
IACR
2011
107views more  IACR 2011»
14 years 2 months ago
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not...
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohl...