Semantic security

Results: 252



#Item
151World Wide Web / Identity / Identity management / Federated identity / Knowledge representation / Security Assertion Markup Language / Linked data / Authentication / OpenID / Semantic Web / Computing / Security

APA VIVO: A Semantic Framework for Scholarly Identity and Trusted Attribute Exchange Hal Warren and Eva Winer American Psychological Association, Washington, DC, USA {hwarren,ewiner}@apa.org

Add to Reading List

Source URL: 2012.eswc-conferences.org

Language: English - Date: 2012-07-23 09:47:35
152ID-based encryption / Cipher / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Ciphertext indistinguishability / RSA

Fully Secure Functional Encryption without Obfuscation Sanjam Garg∗ Craig Gentry† Shai Halevi‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-12 08:24:27
153Cipher / Broadcast encryption / Semantic security / RSA / Advantage / Cryptography / Public-key cryptography / Electronic commerce

Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts Zhen Liu1 , Zhenfu Cao2 , and Duncan S. Wong1 1 City University of Hong Kong, Hong Kong SAR, China.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-04 23:55:25
154National Strategy for Trusted Identities in Cyberspace / Semantic Web / Service-oriented architecture / Cloud computing / Interoperability / Linked data / Computing / Web services / Computer network security

Fall Cubicon Trusted Infrastructure for the Ambient Cloud Architectural solutions to

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-17 13:04:08
155McEliece cryptosystem / Post-quantum cryptography / Semantic security / Chosen-ciphertext attack / Cryptanalysis / Cryptographic hash function / Ciphertext / Niederreiter cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 04:29:49
156Semantic data model / Raytheon / Information systems / Indiana / United States / Technology / Northrop Grumman / Open Travel Alliance / Indiana University – Purdue University Fort Wayne

2 S ERCULATE The newsletter of the Security and Software Engineering Research Center[removed]October 2013 In This Issue

Add to Reading List

Source URL: www.serc.net

Language: English - Date: 2014-11-28 03:31:24
157Computer network security / Identity management systems / Cyberwarfare / Federated identity / Closed-loop authentication / Semantic URL attack / Password / Computer security / Security

ESS Password Reset Process Employee: 1. Contacts DES Service Center via phone or e-mail. a. [removed] b[removed]c[removed]

Add to Reading List

Source URL: www.hr.wa.gov

Language: English - Date: 2012-11-05 18:04:54
158RSA / Malleability / Key encapsulation / ElGamal encryption / Symmetric-key algorithm / Cipher / Homomorphic encryption / Semantic security / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Deniable encryption

How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai UCLA [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-17 11:11:00
159Obfuscation / Obfuscated code / Homomorphic encryption / Zero-knowledge proof / RSA / ID-based encryption / Encryption / Cryptography / Ciphertext indistinguishability / Semantic security

Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg UCLA [removed] Mariana Raykova

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-21 10:06:46
160Formal sciences / Silvio Micali / Shafi Goldwasser / Charles Rackoff / Gödel Prize / Semantic security / Interactive proof system / ACM SIGACT / Provable security / Cryptography / Women in technology / Theoretical computer science

acm Association for Computing Machinery Advancing Computing as a Science & Profession Contact: Virginia Gold

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2013-05-21 15:34:04
UPDATE