Sciweavers

6555 search results - page 1050 / 1311
» Secure attribute-based systems
Sort
View
AFRICACRYPT
2009
Springer
15 years 10 months ago
Unifying Zero-Knowledge Proofs of Knowledge
Abstract. We present a simple zero-knowledge proof of knowledge protocol of which many protocols in the literature are instantiations. These include Schnorr’s protocol for provin...
Ueli M. Maurer
CCGRID
2009
IEEE
15 years 10 months ago
GenLM: License Management for Grid and Cloud Computing Environments
—Software license management allows independent software vendors (ISVs) to control the access of their products. It is a fundamental part of the ISVs’ business strategy. A wide...
Mathias Dalheimer, Franz-Josef Pfreundt
CIDM
2009
IEEE
15 years 10 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
ICDAR
2009
IEEE
15 years 10 months ago
Document Analysis Support for the Manual Auditing of Elections
Recent developments have resulted in dramatic changes in the way elections are conducted, both in the United States and around the world. Well-publicized flaws in the security of...
Daniel P. Lopresti, Xiang Zhou, Xiaolei Huang, Gan...
NDSS
2009
IEEE
15 years 10 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
« Prev « First page 1050 / 1311 Last » Next »