Encryption

Results: 4595



#Item
701

Circular and KDM Security for Identity-Based Encryption Jacob Alperin-Sheriff∗ Chris Peikert† May 1, 2012

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-09-08 16:32:10
    702Secure communication / Cryptographic protocols / Internet Standards / Computer network security / Transport Layer Security / HTTPS / OpenSSL / Cipher suite / Handshaking / End-to-end encryption / Middlebox / Extensible Authentication Protocol

    Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS David Naylor? , Kyle Schomp† , Matteo Varvello‡ , Ilias Leontiadis‡ , Jeremy Blackburn‡ , Diego Lopez‡ , Konstantina Papagiannaki‡ ,

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2015-07-29 16:55:02
    703

    Efficient Encryption for Rich Message Spaces under General Assumptions Hong Wang Alexander Russell

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2001-04-03 12:31:47
      704

      Automated Proofs for Encryption Modes. ⋆ Martin Gagn´e2 , Pascal Lafourcade1 , Yassine Lakhnech1 , and Rei Safavi-Naini2 1

      Add to Reading List

      Source URL: www.lsv.ens-cachan.fr

      Language: English - Date: 2009-07-21 03:17:32
        705

        Traceable Anonymous Encryption Julien Cathalo1 , Malika Izabach` ene2 , 2 David Pointcheval and Damien Vergnaud2 1

        Add to Reading List

        Source URL: www-veto2009.imag.fr

        Language: English - Date: 2009-06-28 05:00:54
          706Computing / Software / Cloud storage / File hosting / Online backup services / Data synchronization / Internet protocols / OwnCloud / CardDAV / Client-side encryption / Dropbox / Frank Karlitschek

          UnPLUGging From Freemium File Hosting With ownCloud Searching for Privacy & Security in the Era of Big Data Jesse Bufton

          Add to Reading List

          Source URL: pdxlinux.org

          Language: English - Date: 2014-12-02 16:01:11
          707File sharing / Distributed data storage / Network architecture / Peer-to-peer / Distributed hash table / Hash list / Clientserver model / Tiny Encryption Algorithm

          Push-to-Pull Peer-to-Peer Live Streaming Thomas Locher, Remo Meier, Stefan Schmid, and Roger Wattenhofer Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzerland {lochert,remmeier,schmiste

          Add to Reading List

          Source URL: dcg.ethz.ch

          Language: English - Date: 2014-09-26 08:36:48
          708

          Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures

          Add to Reading List

          Source URL: ec14.compute.dtu.dk

          Language: English - Date: 2014-05-16 06:53:01
            709

            Accepted Papers LatinCrypt 2014     On  Key  Recovery  Attacks  against  Existing  Somewhat  Homomorphic  Encryption  Schemes  Massimo Chenal, Qiang Tang 

            Add to Reading List

            Source URL: latincrypt2014.labsec.ufsc.br

            Language: English - Date: 2014-08-27 15:24:45
              710

              Scotty: Relocating Physical Objects Across Distances Using Destructive Scanning, Encryption, and 3D Printing

              Add to Reading List

              Source URL: www.stefaniemueller.org

              Language: English - Date: 2015-01-21 21:35:38
                UPDATE