Sciweavers

1663 search results - page 22 / 333
» Privacy and Identity Management
Sort
View
83
Voted
CCS
1998
ACM
15 years 6 months ago
Key Management for Encrypted broadcast
Avishai Wool
115
Voted
ACISP
2007
Springer
15 years 5 months ago
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
Abstract. We propose new instantiations of chosen-ciphertext secure identitybased encryption schemes with wildcards (WIBE). Our schemes outperform all existing alternatives in term...
James Birkett, Alexander W. Dent, Gregory Neven, J...
ACISP
2010
Springer
15 years 3 months ago
Identity-Based Chameleon Hash Scheme without Key Exposure
In this paper, we propose the first identity-based chameleon hash scheme without key exposure, which gives a positive answer for the open problem introduced by Ateniese and de Mede...
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo ...
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 8 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek