• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 38
Next 10 →

Simple and Flexible Private Revocation Checking

by John Solis, Gene Tsudik , 2006
"... Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certificate n ..."
Abstract - Add to MetaCart
needs to be revoked prematurely. For this reason, whenever a client (user or program) needs to assert the validity of another party's certificate, it performs revocation checking. There are many revocation techniques varying in both the operational model and underlying data structures. One

Simple and flexible revocation checking with privacy

by John Solis, Gene Tsudik - In Workshop on Privacy-Enhanced Technologies (PET’06 , 2006
"... Abstract. Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certif ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
of privacy in revocation checking and its contribution is two-fold: it identifies and explores the loss of privacy inherent in current revocation checking, and, it constructs a simple, efficient and flexible privacy-preserving component for one well-known revocation method. 1

Simple and Flexible Privacy-Preserving Revocation Checking

by John Solis, Gene Tsudik , 2006
"... Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certificate need ..."
Abstract - Add to MetaCart
of privacy in revocation checking and its contribution is two-fold: it identifies and explores the loss of privacy inherent in current revocation checking, and, it constructs a simple, efficient and flexible privacy-preserving component for one well-known revocation method. 1

Contents

by Maxwell Krohn, Michael O. Rabin, Michael Mitzenmacher , 1999
"... 1.1 Private and Public Key Cryptography..................... 5 ..."
Abstract - Add to MetaCart
1.1 Private and Public Key Cryptography..................... 5

KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer

by On Smartphones, Jason Lee , 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract - Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,

Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:

by Sebastian Fritsch, Dipl Ing, Vangelis Karatsiolis Erklärung , 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract - Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006

Author manuscript, published in "WWW (Companion Volume) (2012) 211-214" The ERC Webdam on Foundations of Web Data Management ∗

by Serge Abiteboul, Collège De France, Inria Saclay, Ens Cachan, Pierre Senellart, Victor Vianu , 2012
"... The Webdam ERC grant is a five-year project that started in December 2008. The goal is to develop a formal model for Web data management that would open new horizons for the development of the Web in a well-principled way, enhancing its functionality, performance, and reliability. Specifically, the ..."
Abstract - Add to MetaCart
, the goal is to develop a universally accepted formal framework for describing complex and flexible interacting Web applications featuring notably data exchange, sharing, integration, querying, and updating. We also propose to develop formal foundations that will enable peers to concurrently reason about

unknown title

by Boyang Wang , Baochun Li , Hui Li
"... ABSTRACT: Cloud computing is an arising technology which provide various services through internet. User can remotelystored their data on the cloud. And enjoying on demand high quality cloud applications without the burden of local storage and maintenance. But the user do not fell protected because ..."
Abstract - Add to MetaCart
to extend the short signature scheme to give simple ring signatures Ensuring Data storage Security in cloud Computing(2009) To ensure the correctness of user's data in cloud data storage,a effective and flexible distributed scheme with explicit dynamic data support is proposed by C. Wang, Q. Wang, K

Stewardship and Public Service: A Discussion Paper Prepared for the Public Service

by Jim Armstrong - Commission of Canada. James L. Armstrong and Associates. March , 1997
"... Our discussion about stewardship and public service begins with a critique of market based reforms that have profoundly reshaped the public service world-wide during the past two decades. While it is maintained that these reforms were necessary and have resulted in many positive outcomes, the centr ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
trends take us in a direction so far away from selflessly safeguarding public interest that the idea has become untenable, or outdated? • The public service must be flexible and at the same time provide long-term stability. This requires continuously learning and adapting, which indicates that more needs

doi:10.1155/2012/923594 Research Article Analysis of Mobility and Sharing of WSNs By IP Applications

by Dennis J. A. Bijwaard, Paul J. M. Havinga, Henk Eertink
"... License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Movement of wireless sensor and actuator networks, and of nodes between WSANs are becoming more commonplace. However, enabling remote usage of sensory data in multiple ..."
Abstract - Add to MetaCart
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Movement of wireless sensor and actuator networks, and of nodes between WSANs are becoming more commonplace. However, enabling remote usage of sensory data in multiple applications, remote configuration, and actuation is still a big challenge. The purpose of this paper is to analyse and describe which mobility support can best be used in different scenarios, and how shared usage of mobile WSANs by multiple IP applications can best be scaled up. This paper describes logistic and person monitoring scenarios, where different types of movements take place. These mobility types and their implications are categorized and analysed. Different degrees of support for these mobility types are analysed in the context of the mobility scenarios. Additionally, different schemes are analysed for shared use of mobile WSANs by multiple applications. In conclusion, guidelines are provided for dealing with mobile and overlapping WSANs and the most promising scheme for shared use of mobile WSANs by IP applications. 1.
Next 10 →
Results 1 - 10 of 38
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University