Sciweavers

5891 search results - page 80 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
IPPS
1992
IEEE
15 years 5 months ago
Visualization of a Simple Routing Scheme for Meshes
Nelson Ge, John K. Antonio, Sharada V. Vitalpur
IPPS
2005
IEEE
15 years 7 months ago
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
One of the most serious security threats in the Internet are Distributed Denial of Service ( DDoS) attacks, due to the significant service disruption they can create and the di...
Vasilios A. Siris, Ilias Stavrakis
PODC
2003
ACM
15 years 6 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...
WISE
2009
Springer
15 years 10 months ago
Security Policy Definition Framework for SOA-Based Systems
This paper presents an extended architecture of a policy definition framework fine-tuned for service-oriented environments conforming to the SOA distributed processing paradigm. We...
Bartosz Brodecki, Piotr Sasak, Michal Szychowiak
PKC
2010
Springer
161views Cryptology» more  PKC 2010»
15 years 3 months ago
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
ded abstract of this paper appears in 13th International Conference on Practice and Theory in Public Key Cryptography (PKC) 2010, Lecture Notes in Computer Science Vol. ?, P. Nguye...
Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vi...