Sciweavers

1347 search results - page 172 / 270
» Towards a Secure Data Stream Management System
Sort
View
154
Voted
IACR
2011
129views more  IACR 2011»
14 years 4 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
137
Voted
COMCOM
2006
77views more  COMCOM 2006»
15 years 5 months ago
SIP as a unified signalling solution in a beyond 3G system
The adoption of packet-switched technologies in mobile communication systems has enabled the provision of IPbased services to mobile users. Yet, these systems, such as the UMTS net...
Vaggelis Nikas, Georgios V. Lioudakis, Nikolaos L....
ICICS
2007
Springer
15 years 8 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
DBSEC
2008
196views Database» more  DBSEC 2008»
15 years 6 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
ESORICS
2011
Springer
14 years 4 months ago
Supporting Concurrency in Private Data Outsourcing
Abstract. With outsourcing emerging as a successful paradigm for delegating data and service management to third parties, the problem of guaranteeing proper privacy protection agai...
Sabrina De Capitani di Vimercati, Sara Foresti, St...