Sciweavers

27 search results - page 3 / 6
» On the Relationships Between Notions of Simulation-Based Sec...
Sort
View
CIKM
2005
Springer
15 years 3 months ago
Access control for XML: a dynamic query rewriting approach
We introduce the notion of views as a mechanism for securing and providing access control in the context of XML. Research in XML has explored several efficient querying mechanism...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
86
Voted
IFIP11
2004
110views Business» more  IFIP11 2004»
14 years 11 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
15 years 4 months ago
Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks
— This paper presents a new notion of authenticating degraded multimedia content streamed over wireless networks – Unequal Authenticity Protection (UAP). Multimedia content dif...
Zhi Li, Qibin Sun, Yong Lian
76
Voted
OSDI
2006
ACM
15 years 10 months ago
Type-Safe Disks
We present the notion of a type-safe disk (TSD). Unlike a traditional disk system, a TSD is aware of the pointer relationships between disk blocks that are imposed by higher layer...
Gopalan Sivathanu, Swaminathan Sundararaman, Erez ...
61
Voted
CRYPTO
2004
Springer
108views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Many cryptographic primitives begin with parameter generation, which picks a primitive from a family. Such generation can use public coins (e.g., in the discrete-logarithm-based c...
Chun-Yuan Hsiao, Leonid Reyzin