Sciweavers

783 search results - page 156 / 157
» On security proof of McCullagh
Sort
View
CSE
2009
IEEE
13 years 10 months ago
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
Qin Liu, Guojun Wang, Jie Wu
CRYPTO
2008
Springer
92views Cryptology» more  CRYPTO 2008»
13 years 8 months ago
Compression from Collisions, or Why CRHF Combiners Have a Long Output
A black-box combiner for collision resistant hash functions (CRHF) is a construction which given black-box access to two hash functions is collision resistant if at least one of th...
Krzysztof Pietrzak
APPROX
2010
Springer
154views Algorithms» more  APPROX 2010»
13 years 7 months ago
The Checkpoint Problem
In this paper, we consider the checkpoint problem in which given an undirected graph G, a set of sourcedestinations {(s1, t1), (s1, t1), . . . , (sk, tk)} and a set of fixed paths...
MohammadTaghi Hajiaghayi, Rohit Khandekar, Guy Kor...
IM
1997
13 years 7 months ago
Switchlets and Dynamic Virtual ATM Networks
This paper presents a novel approach to the control and management of ATM networks, by allowing di erent control architectures to be operational within the same network, and on th...
Jacobus E. van der Merwe, Ian M. Leslie
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
13 years 7 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...