Sciweavers

436 search results - page 32 / 88
» Using trust assumptions with security requirements
Sort
View
SAINT
2006
IEEE
15 years 10 months ago
A Prototype of a Secure Autonomous Bootstrap Mechanism for Control Networks
There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automatio...
Nobuo Okabe, Shoichi Sakane, Masahiro Ishiyama, At...
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
138
Voted
AAAI
1996
15 years 5 months ago
The NASA Personnel Security Processing Expert System
The NASA Personnel Security Processing Expert System is a tool that automatically determines the appropriate personnel background investigation required for a civil servant or con...
David Silberberg, Robert Thomas
ISPA
2005
Springer
15 years 9 months ago
ID-Based Proxy Signature Using Bilinear Pairings
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate securit...
Jing Xu, Zhenfeng Zhang, Dengguo Feng
CCS
2008
ACM
15 years 6 months ago
Black-box accountable authority identity-based encryption
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters