Sciweavers

2601 search results - page 106 / 521
» Secure Rewarding Schemes
Sort
View
CRYPTO
2010
Springer
195views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone access structures combined with inner-product rel...
Tatsuaki Okamoto, Katsuyuki Takashima
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 9 months ago
Security Enhancements in Novel Passive Optical Networks
— Passive Optical Networks (PONs) solve the bandwidth bottleneck issue as they extend optical networks to homes and businesses. Security concerns in time division multiplexed PON...
Alan Harris, Andres Sierra, Stamatios V. Kartalopo...
IPCCC
2007
IEEE
15 years 9 months ago
Towards Survivable and Secure Wireless Sensor Networks
– In this paper, we present a comprehensive study on the design of secure and survivable wireless sensor networks (WSNs). Our goal is to develop a framework that provides both se...
Yi Qian, Kejie Lu, David Tipper
DBSEC
2008
89views Database» more  DBSEC 2008»
15 years 4 months ago
A New Approach to Secure Logging
Abstract. The need for secure logging is well-understood by the security professionals, including both researchers and practitioners. The ability to efficiently verify all (or some...
Di Ma, Gene Tsudik
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 8 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...