Sciweavers

72 search results - page 15 / 15
» Secure and Serverless RFID Authentication and Search Protoco...
Sort
View
IEEECIT
2010
IEEE
14 years 9 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
VLDB
2007
ACM
115views Database» more  VLDB 2007»
15 years 12 months ago
NS2: Networked Searchable Store with Correctness
In an outsourced data framework, we introduce and demonstrate mechanisms for securely storing a set of data items (documents) on an un-trusted server, while allowing for subsequen...
Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan K...