Sciweavers

2421 search results - page 43 / 485
» Message from the Co-Chairs
Sort
View
IJNSEC
2010
128views more  IJNSEC 2010»
14 years 4 months ago
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu
ICASSP
2011
IEEE
14 years 1 months ago
Detection of anomalous events from unlabeled sensor data in smart building environments
This paper presents a robust unsupervised learning approach for detection of anomalies in patterns of human behavior using multi-modal smart environment sensor data. We model the ...
Padmini Jaikumar, Aca Gacic, Burton Andrews, Micha...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 1 months ago
Online Ciphers from Tweakable Blockciphers
Abstract. Online ciphers are deterministic length-preserving permutations EK : ({0, 1}n )+ → ({0, 1}n )+ where the i-th block of ciphertext depends only on the first i blocks of...
Phillip Rogaway, Haibin Zhang
CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
14 years 11 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
SAC
2006
ACM
14 years 9 months ago
From spontaneous total order to uniform total order: different degrees of optimistic delivery
A total order protocol is a fundamental building block in the construction of distributed fault-tolerant applications. Unfortunately, the implementation of such a primitive can be...
Luís Rodrigues, José Mocito, Nuno Ca...