Sciweavers

947 search results - page 13 / 190
» Provable Implementations of Security Protocols
Sort
View
100
Voted
DBSEC
2007
116views Database» more  DBSEC 2007»
15 years 1 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...
ISW
2007
Springer
15 years 5 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
INFOCOM
2005
IEEE
15 years 5 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
CSFW
2006
IEEE
15 years 3 months ago
Verified Interoperable Implementations of Security Protocols
Karthikeyan Bhargavan, Cédric Fournet, Andr...
CCS
2007
ACM
15 years 5 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves