Sciweavers

1656 search results - page 47 / 332
» Secure Computation Without Authentication
Sort
View
101
Voted
CCS
2009
ACM
16 years 1 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
94
Voted
CORR
2010
Springer
60views Education» more  CORR 2010»
15 years 28 days ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
105
Voted
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
15 years 7 months ago
Fingerprinting Blank Paper Using Commodity Scanners
This paper presents a novel technique for authenticating physical documents based on random, naturally occurring imperfections in paper texture. We introduce a new method for meas...
William Clarkson, Tim Weyrich, Adam Finkelstein, N...
164
Voted
IJNSEC
2006
270views more  IJNSEC 2006»
15 years 24 days ago
Efficient Key Agreement for Large and Dynamic Multicast Groups
Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The ...
Liming Wang, Chuan-Kun Wu
118
Voted
ACSAC
1997
IEEE
15 years 4 months ago
An Efficient Message Authentication Scheme for Link State Routing
We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the authenticity of many routing updates, and some ro...
S. Cheung