搜索结果: 1-15 共查到“知识库 计算机科学技术 SECURE”相关记录22条 . 查询时间(0.247 秒)
The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation.Barthe, D’Argenio, and Rezk coined the term “self-composition...
Maturity and Performance of Programmable Secure Computation
secure computation Performance
2015/12/22
Secure computation (SC) stands for a group of technologies for computing functions
of private inputs, while keeping the inputs themselves hidden. The canonical
example of secure computation is the m...
We present a new class of signature schemes based on properties of certain bilinear algebraic maps. These signatures are secure against existential forgery under a chosen message attack in the standar...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. T...
Circular-Secure Encryption from Decision Diffie-Hellman
Decision Diffie-Hellman Circular-Secure Encryption
2015/8/5
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a ``key cycle'' usage, where we ha...
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
Secure Signatures Chosen Ciphertext Security
2015/8/5
We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext
security. In the case of signatures, we enhance the standard chosen message query model
by allowing the adver...
SessionJuggler: Secure Web Login From an Untrusted Terminal Using Session Hijacking
Untrusted Terminal Secure Web Login From
2015/8/5
We use modern features of web browsers to develop a secure login system from an untrusted terminal. The system, called SessionJuggler, requires no server-side changes and no special software on the te...
Toward A Secure and Scalable Internet and Economic Incentives for Evolvable Internet Architecture
Applied sciences Internet security Scalable internet Internet architecture Strategic decision making Self-owned networks
2014/11/7
The Internet consists of tens of thousands of interconnected diverse, self-owned smaller networks. These networks engage in strategic decision making to maximize their own performance or benefits. In ...
This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is pr...
A secure media streaming mechanism combining encryption, authentication, and transcoding
Intelligent mid-network proxy Secure transcoding Sender authentication Media-aware encryption Media streaming
2013/7/16
Technology advancements are allowing more and more new media applications and services to be delivered over the Internet. Many of these applications and services require flexibility in media dis...
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
3G Security 3G Security Structure 3G authentication and key agreement protocol Security arith- metic
2013/1/29
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible V...
Users and Network Management for Secure Interworking and Roaming in WiMAX, 3G and Wi-Fi Networks Using RII Architcture
Network Management Secure Interworking Roaming WiMAX 3G Wi-Fi Networks
2010/9/20
The increase in the usage of different access technologies has led to aneed for new mechanisms to manage interworking and roaming betweendifferent network technologies. To provide secure and seamless ...
Whena Supervisory Control and Data Acquisition (SCADA) system monitors andmanages other complex infrastructures through the use of distributedtechnologies, it becomes a critical infrastructure by itse...
Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services
Data Warehouses Security MDA OLAP QVT
2014/3/11
Data Warehouses manage historical information for the decision making process, and this information could be discovered by unauthorized users if security constraints are not established. It is therefo...