Sciweavers

1059 search results - page 135 / 212
» Modeling Security Protocols as Games
Sort
View
90
Voted
JUCS
2007
96views more  JUCS 2007»
15 years 15 days ago
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
At Eurocrypt 2005, Boneh, Boyen and Goh presented a constant size ciphertext hierarchical identity based encryption (HIBE) protocol. Our main contribution is to present a variant ...
Sanjit Chatterjee, Palash Sarkar
89
Voted
CORR
2010
Springer
137views Education» more  CORR 2010»
15 years 21 days ago
Optimizing real-time RDF data streams
Abstract. The Resource Description Framework (RDF) provides a common data model for the integration of emerging "real-time" streams of social and sensor data with the Web...
Joshua Shinavier
ESAS
2007
Springer
15 years 6 months ago
Security Associations in Personal Networks: A Comparative Analysis
Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different pro...
Jani Suomalainen, Jukka Valkonen, N. Asokan
99
Voted
EUROCRYPT
2010
Springer
15 years 5 months ago
Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-rel...
Kenneth G. Paterson, Gaven J. Watson
82
Voted
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
15 years 18 days ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu