Sciweavers

88 search results - page 13 / 18
» Public Key Encryption with Keyword Search
Sort
View
70
Voted
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
15 years 2 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
INFOCOM
2009
IEEE
15 years 4 months ago
ACTION: Breaking the Privacy Barrier for RFID Systems
—In order to protect privacy, Radio Frequency Identification (RFID) systems employ Privacy-Preserving Authentication (PPA) to allow valid readers to explicitly authenticate their...
Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu
78
Voted
ISPEC
2010
Springer
14 years 11 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
77
Voted
SOUPS
2009
ACM
15 years 4 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
KDD
2008
ACM
211views Data Mining» more  KDD 2008»
15 years 10 months ago
ArnetMiner: extraction and mining of academic social networks
This paper addresses several key issues in the ArnetMiner system, which aims at extracting and mining academic social networks. Specifically, the system focuses on: 1) Extracting ...
Jie Tang, Jing Zhang, Limin Yao, Juanzi Li, Li Zha...