Sciweavers

68 search results - page 8 / 14
» Improving privacy and security in multi-authority attribute-...
Sort
View
CCS
2005
ACM
15 years 3 months ago
Improving Brumley and Boneh timing attack on unprotected SSL implementations
Since the remarkable work of Kocher [7], several papers considering different types of timing attacks have been published. In 2003, Brumley and Boneh presented a timing attack on...
Onur Aciiçmez, Werner Schindler, Çet...
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
15 years 1 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
IACR
2011
158views more  IACR 2011»
13 years 9 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
ECIS
2004
14 years 11 months ago
Security and privacy in a structured information network
The lack of trust amongst consumers and concerns about disclosing personal information are commonly seen as a major impediment to the growth of e-commerce. This is a consequence o...
Tuomas Valtonen, Tero Reuna, Kalle Luhtinen
ICISC
2004
173views Cryptology» more  ICISC 2004»
14 years 11 months ago
On Private Scalar Product Computation for Privacy-Preserving Data Mining
In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mi...
Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mi...