A New Leakage-Resilient IBE Scheme in the Relative Leakage Model (Englisch)
Freier Zugriff
- Neue Suche nach: Chen, Yu
- Neue Suche nach: Luo, Song
- Neue Suche nach: Chen, Zhong
- Neue Suche nach: Chen, Yu
- Neue Suche nach: Luo, Song
- Neue Suche nach: Chen, Zhong
In:
Data and Applications Security and Privacy XXV
9
;
263-270
;
2011
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A New Leakage-Resilient IBE Scheme in the Relative Leakage Model
-
Beteiligte:
-
Erschienen in:Data and Applications Security and Privacy XXV , 9 ; 263-270Lecture Notes in Computer Science ; 6818, 9 ; 263-270
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:8 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Information Flow Containment: A Practical Basis for Malware DefenseSekar, R. et al. | 2011
- 4
-
Re-designing the Web’s Access Control SystemDu, Wenliang / Tan, Xi / Luo, Tongbo / Jayaraman, Karthick / Zhu, Zutao et al. | 2011
- 12
-
Integrated Management of Security PoliciesParaboschi, Stefano et al. | 2011
- 14
-
Cooperative Data Access in Multi-cloud EnvironmentsLe, Meixing / Kant, Krishna / Jajodia, Sushil et al. | 2011
- 29
-
Multiparty Authorization Framework for Data Sharing in Online Social NetworksHu, Hongxin / Ahn, Gail-Joon et al. | 2011
- 44
-
Enforcing Confidentiality and Data Visibility Constraints: An OBDD ApproachCiriani, Valentina / Capitani di Vimercati, Sabrina / Foresti, Sara / Livraga, Giovanni / Samarati, Pierangela et al. | 2011
- 60
-
Public-Key Encrypted Bloom Filters with Applications to Supply Chain IntegrityKerschbaum, Florian et al. | 2011
- 76
-
An Optimization Model for the Extended Role Mining ProblemUzun, Emre / Atluri, Vijayalakshmi / Lu, Haibing / Vaidya, Jaideep et al. | 2011
- 90
-
Dynamics in Delegation and Revocation Schemes: A Logical ApproachAucher, Guillaume / Barker, Steve / Boella, Guido / Genovese, Valerio / Torre, Leendert et al. | 2011
- 106
-
History-Dependent Inference Control of Queries by Dynamic Policy AdaptionBiskup, Joachim et al. | 2011
- 122
-
Multilevel Secure Data Stream ProcessingAdaikkalavan, Raman / Ray, Indrakshi / Xie, Xing et al. | 2011
- 138
-
Query Processing in Private Data Outsourcing Using AnonymizationNergiz, Ahmet Erhan / Clifton, Chris et al. | 2011
- 154
-
Private Database Search with Sublinear Query TimeFrikken, Keith B. / Li, Boyang et al. | 2011
- 170
-
Efficient Distributed Linear Programming with Limited DisclosureHong, Yuan / Vaidya, Jaideep / Lu, Haibing et al. | 2011
- 186
-
Privacy-Preserving Data Mining: A Game-Theoretic ApproachMiyaji, Atsuko / Rahman, Mohammad Shahriar et al. | 2011
- 201
-
Enhancing CardSpace Authentication Using a Mobile DeviceAl-Sinani, Haitham S. / Mitchell, Chris J. et al. | 2011
- 217
-
Verifiable Secret Sharing with Comprehensive and Efficient Public VerificationPeng, Kun et al. | 2011
- 231
-
A Robust Remote User Authentication Scheme against Smart Card Security BreachLi, Chun-Ta / Lee, Cheng-Chi / Liu, Chen-Ju / Lee, Chin-Wen et al. | 2011
- 239
-
N-Gram Based Secure Similar Document DetectionJiang, Wei / Samanthula, Bharath K. et al. | 2011
- 247
-
An Index Structure for Private Data OutsourcingSteele, Aaron / Frikken, Keith B. et al. | 2011
- 255
-
Selective Disclosure on Encrypted DocumentsLei, Hao / Feng, Dengguo et al. | 2011
- 263
-
A New Leakage-Resilient IBE Scheme in the Relative Leakage ModelChen, Yu / Luo, Song / Chen, Zhong et al. | 2011
- 271
-
Accurate Accident Reconstruction in VANETKopylova, Yuliya / Farkas, Csilla / Xu, Wenyuan et al. | 2011
- 280
-
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based LearningDutt, Varun / Ahn, Young-Suk / Gonzalez, Cleotilde et al. | 2011
- 293
-
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBACBerhe, Solomon / Demurjian, Steven / Gokhale, Swapna / Pavlich-Mariscal, Jaime / Saripalle, Rishi et al. | 2011
- 301
-
Preserving Privacy in Structural NeuroimagesSchimke, Nakeisha / Kuehler, Mary / Hale, John et al. | 2011