• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 132
Next 10 →

Chosen-Ciphertext Security from Identity-Based Encryption. Adv

by Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz - in Cryptology — Eurocrypt 2004, LNCS , 2004
"... We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. Our constructions have ramifications of both theoretical and practical interest. First, our schemes give a n ..."
Abstract - Cited by 280 (13 self) - Add to MetaCart
We propose simple and efficient CCA-secure public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. Our constructions have ramifications of both theoretical and practical interest. First, our schemes give a

Access pattern disclosure on searchable encryption: Ramification, attack and mitigation

by Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu - in Network and Distributed System Security Symposium (NDSS , 2012
"... The advent of cloud computing has ushered in an era of mass data storage in remote servers. Remote data storage offers reduced data management overhead for data owners in a cost effective manner. Sensitive documents, however, need to be stored in encrypted format due to security con-cerns. But, encr ..."
Abstract - Cited by 40 (0 self) - Add to MetaCart
The advent of cloud computing has ushered in an era of mass data storage in remote servers. Remote data storage offers reduced data management overhead for data owners in a cost effective manner. Sensitive documents, however, need to be stored in encrypted format due to security con-cerns. But

A Taxonomy of Security-Related Requirements

by Donald G. Firesmith
"... Safety and security are closely related subtypes of defensibility, another quality factor in a quality model. The close similarity between these two quality factors implies that a taxonomy of safety-related requirements is a good place to begin when developing an analogous taxonomy of security-relat ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
-related requirements. The resulting taxonomy consists of pure security requirements specifying minimum acceptable amounts of security, security-significant requirements which are non-security requirements with important security ramifications, security system requirements specifying requirements for security

A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness ∗

by Gilad Asharov, Yehuda Lindell, Tal Rabin , 2013
"... It is well known that it is impossible for two parties to toss a coin fairly (Cleve, STOC 1986). This result implies that it is impossible to securely compute with fairness any function that can be used to toss a coin fairly. In this paper, we focus on the class of deterministic Boolean functions wi ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
It is well known that it is impossible for two parties to toss a coin fairly (Cleve, STOC 1986). This result implies that it is impossible to securely compute with fairness any function that can be used to toss a coin fairly. In this paper, we focus on the class of deterministic Boolean functions

PERENNIAL SIMULATION OF A LEGACY TRAFFIC MODEL: IMPLEMENTATION, CONSIDERATIONS, AND RAMIFICATIONS

by S. Jain, R. R. Creasey, J. Himmelspach, K. P. White, M. Fu, Seth N. Hetu, Gary Tan
"... A prototype implementation of a “perennial ” simulation framework, previously introduced for crisis management studies, is detailed and applied to a simple traffic dynamics study. In addition to proving the framework, this study also demonstrates a method for encapsulating legacy models and simulati ..."
Abstract - Add to MetaCart
and simulations to allow them to interact compatibly with the framework. Finally, the traffic application itself features a straightforward and logically pipelined image processing algorithm intended to analyze traffic logistics data from security cameras in real-time –an important prerequisite for symbiotic

Wireless LAN Location-Sensing for Security Applications

by Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wallach , 2003
"... This paper considers the problem of using wireless LAN locationsensing for security applications. Recently, Bayesian methods have been successfully used to determine location from wireless LAN signals, but such methods have the drawback that a model must first be built from training data. The introd ..."
Abstract - Cited by 58 (2 self) - Add to MetaCart
This paper considers the problem of using wireless LAN locationsensing for security applications. Recently, Bayesian methods have been successfully used to determine location from wireless LAN signals, but such methods have the drawback that a model must first be built from training data

Whom You Know Matters: Venture Capital Networks and Investment Performance,

by Yael Hochberg , Alexander Ljungqvist , Yang Lu , Steve Drucker , Jan Eberly , Eric Green , Yaniv Grinstein , Josh Lerner , Laura Lindsey , Max Maksimovic , Roni Michaely , Maureen O'hara , Ludo Phalippou Mitch Petersen , Jesper Sorensen , Per Strömberg Morten Sorensen , Yael Hochberg , Johnson - Journal of Finance , 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract - Cited by 138 (8 self) - Add to MetaCart
securities (Benveniste and Spindt (1989), Cornelli and Goldreich (2001)). In the corporate loan market, banks often prefer syndicating loans with other banks over being the sole lender. Similarly, in the primary equity and bond markets, banks tend to co-underwrite securities offerings with banks they have

Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White Space Networks

by Omid Fatemieh, Ranveer Chandra
"... Abstract—Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (cognitive radio) networks. We consider the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. We propo ..."
Abstract - Cited by 12 (2 self) - Add to MetaCart
Abstract—Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (cognitive radio) networks. We consider the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. We

BUILDING MOBILE SENSOR NETWORKS USING SMARTPHONES AND WEB SERVICES: RAMIFICATIONS AND DEVELOPMENT CHALLENGES

by n.n.
"... Wireless sensor networks are composed of geographically dispersed sensors that work together to monitor physical or environmental conditions, such as air pressure, temperature, or pollution. Wireless sensor networks are used in many industrial, social, and regulatory applications, including industri ..."
Abstract - Add to MetaCart
industrial process monitoring and control, environment and habitat monitoring, healthcare, home automation, and traffic control. Developers of wireless sensor networks face a number of programming and deployment challenges, such as networking protocol design, application development, and security models

StackGhost: Hardware Facilitated Stack Protection

by Mike Frantzen, Mike Shuey - In Proceedings of the 10th USENIX Security Symposium , 2001
"... Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem 's Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard applications' ret ..."
Abstract - Cited by 94 (0 self) - Add to MetaCart
Conventional security exploits have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem 's Sparc processor architecture, we were able to implement a kernel modification to transparently and automatically guard applications
Next 10 →
Results 1 - 10 of 132
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University