Sciweavers

947 search results - page 138 / 190
» HMM-Based Trust Model
Sort
View
102
Voted
CRYPTO
2003
Springer
95views Cryptology» more  CRYPTO 2003»
15 years 5 months ago
Plaintext Awareness via Key Registration
Abstract. In this paper, we reconsider the notion of plaintext awareness. We present a new model for plaintext-aware encryption that is both natural and useful. We achieve plaintex...
Jonathan Herzog, Moses Liskov, Silvio Micali
90
Voted
ICICS
2003
Springer
15 years 5 months ago
Practical Service Charge for P2P Content Distribution
With emerging decentralized technologies, peer-to-peer (P2P) content distribution arises as a new model for storage and transmission of data. In this scenario, one peer can be play...
Jose Antonio Onieva, Jianying Zhou, Javier Lopez
97
Voted
FC
2009
Springer
84views Cryptology» more  FC 2009»
15 years 4 months ago
Private Intersection of Certified Sets
Abstract. This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersec...
Jan Camenisch, Gregory M. Zaverucha
ACSAC
2004
IEEE
15 years 4 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
133
Voted
HPCNCS
2007
15 years 2 months ago
A Formal Approach for Identity Management in Federated Web Services
The objective of the proposed work is to formally specify and implement a federated web service model in which the identity management problem and security features are analyzed. ...
S. Chandrasekaran, C. Dinesh, Kartic Ramesh, Al. M...