Results 1 - 10
of
132
Chosen-Ciphertext Security from Identity-Based Encryption. Adv
- in Cryptology — Eurocrypt 2004, LNCS
, 2004
"... We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. Our constructions have ramifications of both theoretical and practical interest. First, our schemes give a n ..."
Abstract
-
Cited by 280 (13 self)
- Add to MetaCart
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. Our constructions have ramifications of both theoretical and practical interest. First, our schemes give a
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
- in Network and Distributed System Security Symposium (NDSS
, 2012
"... The advent of cloud computing has ushered in an era of mass data storage in remote servers. Remote data storage offers reduced data management overhead for data owners in a cost effective manner. Sensitive documents, however, need to be stored in encrypted format due to security con-cerns. But, encr ..."
Abstract
-
Cited by 40 (0 self)
- Add to MetaCart
The advent of cloud computing has ushered in an era of mass data storage in remote servers. Remote data storage offers reduced data management overhead for data owners in a cost effective manner. Sensitive documents, however, need to be stored in encrypted format due to security con-cerns. But
A Taxonomy of Security-Related Requirements
"... Safety and security are closely related subtypes of defensibility, another quality factor in a quality model. The close similarity between these two quality factors implies that a taxonomy of safety-related requirements is a good place to begin when developing an analogous taxonomy of security-relat ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
-related requirements. The resulting taxonomy consists of pure security requirements specifying minimum acceptable amounts of security, security-significant requirements which are non-security requirements with important security ramifications, security system requirements specifying requirements for security
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness ∗
, 2013
"... It is well known that it is impossible for two parties to toss a coin fairly (Cleve, STOC 1986). This result implies that it is impossible to securely compute with fairness any function that can be used to toss a coin fairly. In this paper, we focus on the class of deterministic Boolean functions wi ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
It is well known that it is impossible for two parties to toss a coin fairly (Cleve, STOC 1986). This result implies that it is impossible to securely compute with fairness any function that can be used to toss a coin fairly. In this paper, we focus on the class of deterministic Boolean functions
PERENNIAL SIMULATION OF A LEGACY TRAFFIC MODEL: IMPLEMENTATION, CONSIDERATIONS, AND RAMIFICATIONS
"... A prototype implementation of a “perennial ” simulation framework, previously introduced for crisis management studies, is detailed and applied to a simple traffic dynamics study. In addition to proving the framework, this study also demonstrates a method for encapsulating legacy models and simulati ..."
Abstract
- Add to MetaCart
and simulations to allow them to interact compatibly with the framework. Finally, the traffic application itself features a straightforward and logically pipelined image processing algorithm intended to analyze traffic logistics data from security cameras in real-time –an important prerequisite for symbiotic
Wireless LAN Location-Sensing for Security Applications
, 2003
"... This paper considers the problem of using wireless LAN locationsensing for security applications. Recently, Bayesian methods have been successfully used to determine location from wireless LAN signals, but such methods have the drawback that a model must first be built from training data. The introd ..."
Abstract
-
Cited by 58 (2 self)
- Add to MetaCart
This paper considers the problem of using wireless LAN locationsensing for security applications. Recently, Bayesian methods have been successfully used to determine location from wireless LAN signals, but such methods have the drawback that a model must first be built from training data
Whom You Know Matters: Venture Capital Networks and Investment Performance,
- Journal of Finance
, 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract
-
Cited by 138 (8 self)
- Add to MetaCart
securities (Benveniste and Spindt (1989), Cornelli and Goldreich (2001)). In the corporate loan market, banks often prefer syndicating loans with other banks over being the sole lender. Similarly, in the primary equity and bond markets, banks tend to co-underwrite securities offerings with banks they have
Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White Space Networks
"... Abstract—Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (cognitive radio) networks. We consider the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. We propo ..."
Abstract
-
Cited by 12 (2 self)
- Add to MetaCart
Abstract—Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (cognitive radio) networks. We consider the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. We
BUILDING MOBILE SENSOR NETWORKS USING SMARTPHONES AND WEB SERVICES: RAMIFICATIONS AND DEVELOPMENT CHALLENGES
"... Wireless sensor networks are composed of geographically dispersed sensors that work together to monitor physical or environmental conditions, such as air pressure, temperature, or pollution. Wireless sensor networks are used in many industrial, social, and regulatory applications, including industri ..."
Abstract
- Add to MetaCart
industrial process monitoring and control, environment and habitat monitoring, healthcare, home automation, and traffic control. Developers of wireless sensor networks face a number of programming and deployment challenges, such as networking protocol design, application development, and security models
StackGhost: Hardware Facilitated Stack Protection
- In Proceedings of the 10th USENIX Security Symposium
, 2001
"... Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem 's Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard applications' ret ..."
Abstract
-
Cited by 94 (0 self)
- Add to MetaCart
Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem 's Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard applications
Results 1 - 10
of
132