Results 1 - 10
of
87
H.: Homomorphic encryption with access policies: Characterization and new constructions
- Progress in Cryptology AFRICACRYPT 2013
"... ar ..."
A.: Group homomorphic encryption: Characterizations, impossibility results, and applications
- Designs, Codes and Cryptography DOI
"... Abstract. We give a complete characterization both in terms of security and design of all currently existing group homomorphic encryption schemes, i.e., existing encryption schemes with a group homomorphic decryption function such as ElGamal and Paillier. To this end, we formalize and identify the b ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
allowing access to a certain oracle beforehand. Our results allow for contributing to a variety of open problems such as the IND-CCA1 security of Paillier’s scheme, or the use of linear codes in group homomorphic encryption. Furthermore, we design a new cryptosystem which provides features that are unique
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
domain of our eco-social system is thereby transformed. We live in a new economy, characterized by three fundamental features. First, it is informational , that is, the capacity of generating knowledge and processing/managing information determine the productivity and competitiveness of all kinds
Decentralized Contact Power of Data Stored In Cloud Using Explanation Strategy Quality Based Encryption
"... In this paper explanation strategy quality Based Encryption scheme is used to control unauthorized access. In addition revocation scheme is used for time based file assured deletion. addresses this open issue by, on one hand, characterizing and implementing access policies based on data qualities, a ..."
Abstract
- Add to MetaCart
In this paper explanation strategy quality Based Encryption scheme is used to control unauthorized access. In addition revocation scheme is used for time based file assured deletion. addresses this open issue by, on one hand, characterizing and implementing access policies based on data qualities
Private, but restricted, access to databases
"... Abstract—We consider the primitive of restricted oblivious transfer: the owner of a database wants to restrict the access of users to this data according to some policy, whereas a legitimate user wants to privately retrieve allowed parts of the data, without letting the owner know which part of the ..."
Abstract
- Add to MetaCart
Abstract—We consider the primitive of restricted oblivious transfer: the owner of a database wants to restrict the access of users to this data according to some policy, whereas a legitimate user wants to privately retrieve allowed parts of the data, without letting the owner know which part
Enabling Automated Threat Response through the Use of a Dynamic Security Policy
"... Information systems security issues are currently being addressed using different techniques, such as authentication, encryption and access control, through the definition of security policies, but also using monitoring techniques, in particular intrusion detection systems. We can observe that secur ..."
Abstract
-
Cited by 11 (2 self)
- Add to MetaCart
Information systems security issues are currently being addressed using different techniques, such as authentication, encryption and access control, through the definition of security policies, but also using monitoring techniques, in particular intrusion detection systems. We can observe
Performance Characterization of Traffic Equalizers on Heterogeneous Communication Links
"... Abstract. Aggregating the bandwidth of multiple low-cost physical communication links to form a single, higher capacity logical link is a common and inexpensive approach to increasing network performance. Aggregating or bonding links has traditionally been used in relatively static settings such as ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
the performance of aggregating the bandwidth of increasingly heterogeneous links. In this paper we examine the end-to-end performance of a single TCP connection with packets transmitted over multiple heterogeneous links. We describe a testbed we constructed, present empirical results, and introduce a new Linux
New Trapdoor Projection Maps for Composite-Order Bilinear Groups
"... An asymmetric pairing over groups of composite order is a bilinear map e: G1 × G2 → GT for groups G1 and G2 of composite order N = pq. We observe that a recent construction of pairing-friendly elliptic curves in this setting by Boneh, Rubin, and Silverberg exhibits surprising and unprecedented struc ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
, to restrict the homomorphic operations that may be performed. We also present a variant of the Groth-Ostrovsky-Sahai NIZK, and new anonymous IBE, signature, and encryption schemes. 1
Removal of Escrow Problem and Revocation Problem in Distributed Data Sharing
"... ABSTRACT: Distributed data sharing has became an increasing challenge in modern distributed systems like cloud computing and online social networks etc., due to its data sharing archetype. The implementation of accessing policies and maintaining the policy updates has become a challenging issue in ..."
Abstract
- Add to MetaCart
in our Data sharing archetypes. Cipher text policy attributebased encryption (CP-ABE) is appropriate a capable cryptographic solution to this problem. Our CP-ABE facilitates the data owners to characterize their individual access policy over user attributes and implement the policies on the data
unknown title
"... IOS Press Utilization of intelligent agents for supporting citizens in their access to e-government services 1 ..."
Abstract
- Add to MetaCart
IOS Press Utilization of intelligent agents for supporting citizens in their access to e-government services 1
Results 1 - 10
of
87