Sciweavers

5891 search results - page 110 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
CSREASAM
2003
15 years 2 months ago
Implementing a Prototype of the Security Framework for Distributed Brokering Systems
Security is an important element of any system design. Entities supported by a system need to securely interact with each other. The problem gets even more complex in the context ...
Yan Yan, Yi Huang, Geoffrey Fox, Shrideep Pallicka...
IEICET
2010
105views more  IEICET 2010»
15 years 1 days ago
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
In this paper, we introduce the intermediate hashed Diffie-Hellman (IHDH) assumption which is weaker than the hashed DH (HDH) assumption (and thus the decisional DH assumption), a...
Goichiro Hanaoka, Kaoru Kurosawa
PCM
2009
Springer
98views Multimedia» more  PCM 2009»
15 years 6 months ago
Secure Domain Architecture for Interoperable Content Distribution
Authorized domains are used to share digital content among multiple devices without violating the copyright issues. However, if a domain is composed of multiple devices supporting ...
Lei Lei Win, Tony Thomas, Sabu Emmanuel, Mohan S. ...
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
14 years 10 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
15 years 7 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin