Semantic security

Results: 252



#Item
81Ciphertext indistinguishability / Deniable encryption / Semantic security / Public-key cryptography / Applied mathematics / Cipher / Probabilistic encryption / Cryptography / Cyberwarfare / Security

On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 09:46:16
82Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-27 15:51:40
83Computing / Security / Web services / Human–computer interaction / Internet ethics / Information privacy / Internet privacy / Semantic Web / Differential privacy / Ethics / Privacy / Identity

7 Billion Home Telescopes: Observing Social Machines through Personal Data Stores Max Van Kleek Daniel Alexander Smith

Add to Reading List

Source URL: eprints.soton.ac.uk

Language: English - Date: 2014-03-25 08:51:10
84Semantic Web / Natural language processing / Computer network security / Penetration test / Software testing

Application of Semantic Techniques to CC Problems

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:31
85Semantic Web / Cryptographic protocols / Secure communication / FOAF / HTTP Secure / Transport Layer Security / Named graph / X.509 / Public key infrastructure / Cryptography / Public-key cryptography / Key management

FOAF+SSL: RESTful Authentication for the Social Web? Henry Story1 , Bruno Harbulot2 , Ian Jacobi3 , and Mike Jones2 1 2

Add to Reading List

Source URL: bblfish.net

Language: English - Date: 2010-06-27 11:37:24
86Snippet / Personalization / Google Search / Information science / Information retrieval / Personalized search

Generating Personalized Web Search Using Semantic Context 3 Zheng Xu2, 1 and Hai- Yan Chen 1 The Third Research Institute of Ministry of Public Security, Shanghai, China

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-10-28 04:00:02
87Cramer–Shoup cryptosystem / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / ElGamal encryption / Semantic security / Ciphertext / Blinding / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-05 12:17:37
88Phishing / Crime / Computer network security / Ethics / Criminology / Anti-phishing software / In-session phishing / Social engineering / Computer crimes / Spamming

TRUST AND SEMANTIC ATTACKS - II Class Notes: February 23, 2006

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-02-28 20:18:35
89RSA / Chosen-plaintext attack / Chosen-ciphertext attack / Advantage / ElGamal encryption / Ciphertext / Semantic security / Malleability / Cryptography / Ciphertext indistinguishability / Authenticated encryption

An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-09 19:14:56
90Cryptographic protocols / Public-key cryptography / World Wide Web / HTTP / Key management / FOAF / Transport Layer Security / HTTP Secure / X.509 / Computing / Semantic Web / Internet

mod_authn_webid.c, mod_authz_webid.c

Add to Reading List

Source URL: dig.csail.mit.edu

Language: English - Date: 2011-02-01 14:35:35
UPDATE