Sciweavers

954 search results - page 62 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
EUROPKI
2004
Springer
15 years 3 months ago
Distributing Security-Mediated PKI
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...
Gabriel Vanrenen, Sean W. Smith
SRDS
2003
IEEE
15 years 3 months ago
SNARE: A Strong Security Scheme for Network-Attached Storage
This paper presents a strong security scheme for network-attached storage (NAS) that is based on capability and uses a key distribution scheme to keep network-attached storage fro...
Yingwu Zhu, Yiming Hu
CRYPTO
2001
Springer
97views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Minimal Complete Primitives for Secure Multi-party Computation
Abstract. The study of minimal cryptographic primitives needed to implement secure computation among two or more players is a fundamental question in cryptography. The issue of com...
Matthias Fitzi, Juan A. Garay, Ueli M. Maurer, Raf...
NSDI
2008
15 years 4 days ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
14 years 9 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu