Sciweavers

5722 search results - page 192 / 1145
» Security Function Interactions
Sort
View
ICMCS
2009
IEEE
82views Multimedia» more  ICMCS 2009»
14 years 10 months ago
An interactive video streaming architecture for H.264/AVC compliant players
In this paper, we describe an interactive streaming architecture. The content streamed by this architecture is encoded with the H.264/AVC standard for video compression. The archi...
Etienne Bömcke, Christophe De Vleeschouwer
ENTCS
2008
87views more  ENTCS 2008»
15 years 25 days ago
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the com...
Dries Schellekens, Brecht Wyseur, Bart Preneel
110
Voted
SCN
2008
Springer
15 years 21 days ago
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
In this paper, we build, in a generic way, two asymmetric cryptosystems with a careful study of their security. We present first an additively homomorphic scheme which generalizes,...
Guilhem Castagnos
CCS
2011
ACM
14 years 22 days ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
153
Voted
CODASPY
2012
13 years 8 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...