Client-Controlled Cryptography-as-a-Service in the Cloud (English)
- New search for: Bleikertz, Sören
- New search for: Bugiel, Sven
- New search for: Ideler, Hugo
- New search for: Nürnberger, Stefan
- New search for: Sadeghi, Ahmad-Reza
- New search for: Bleikertz, Sören
- New search for: Bugiel, Sven
- New search for: Ideler, Hugo
- New search for: Nürnberger, Stefan
- New search for: Sadeghi, Ahmad-Reza
-
ISSN:
- Conference paper / Print
-
Title:Client-Controlled Cryptography-as-a-Service in the Cloud
-
Contributors:Bleikertz, Sören ( author ) / Bugiel, Sven ( author ) / Ideler, Hugo ( author ) / Nürnberger, Stefan ( author ) / Sadeghi, Ahmad-Reza ( author )
-
Published in:Lecture Notes in Computer Science ; 7954 ; 19-36
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013
-
Size:18 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Transparent, Distributed, and Replicated Dynamic Provable Data PossessionEtemad, M. / Kupcu, A. et al. | 2013
- 19
-
Client-Controlled Cryptography-as-a-Service in the CloudBleikertz, S. / Bugiel, S. / Ideler, H. / Nurnberger, S. / Sadeghi, A.-R. et al. | 2013
- 37
-
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud ComputingChen, Y.-R. / Chu, C.-K. / Tzeng, W.-G. / Zhou, J. et al. | 2013
- 53
-
Computing on Authenticated Data for Adjustable PredicatesDeiseroth, B. / Fehr, V. / Fischlin, M. / Maasz, M. / Reimers, N.F. / Stein, R. et al. | 2013
- 69
-
Towards Efficient Private Distributed Computation on Unbounded Input Streams (Extended Abstract)Dolev, S. / Garay, J. / Gilboa, N. / Kolesnikov, V. / Yuditsky, Y. et al. | 2013
- 84
-
From Oblivious AES to Efficient and Secure Database Join in the Multiparty SettingLaur, S. / Talviste, R. / Willemson, J. et al. | 2013
- 102
-
Private Database Queries Using Somewhat Homomorphic EncryptionBoneh, D. / Gentry, C. / Halevi, S. / Wang, F. / Wu, D.J. et al. | 2013
- 119
-
BLAKE2: Simpler, Smaller, Fast and MD5Aumasson, J.-P. / Neves, S. / Wilcox-O Hearn, Z. / Winnerlein, C. et al. | 2013
- 136
-
Cryptophia's Short Combiner for Collision-Resistant Hash FunctionsMittelbach, A. et al. | 2013
- 154
-
Generic Attacks for the Xor of k Random PermutationsPatarin, J. et al. | 2013
- 170
-
Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network TwistSasaki, Y. et al. | 2013
- 186
-
Constructing Practical Signcryption KEM from Standard Assumptions without Random OraclesLi, X. / Qian, H. / Yu, Y. / Zhou, Y. / Weng, J. et al. | 2013
- 202
-
Sequential Aggregate Signatures Made ShorterLee, K. / Lee, D.H. / Yung, M. et al. | 2013
- 218
-
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBEBendlin, R. / Krehbiel, S. / Peikert, C. et al. | 2013
- 237
-
Toward Practical Group EncryptionEl Aimani, L. / Joye, M. et al. | 2013
- 253
-
Experimental Analysis of Attacks on Next Generation Air Traffic CommunicationSchafer, M. / Lenders, V. / Martinovic, I. et al. | 2013
- 272
-
Launching Generic Attacks on iOS with Approved Third-Party ApplicationsHan, J. / Kywe, S.M. / Yan, Q. / Bao, F. / Deng, R. / Gao, D. / Li, Y. / Zhou, J. et al. | 2013
- 290
-
Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve CryptographyWenger, E. et al. | 2013
- 307
-
Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity ProcessorsHenson, M. / Taylor, S. et al. | 2013
- 322
-
NEON Implementation of an Attribute-Based Encryption SchemeSanchez, A.H. / Rodriguez-Henriquez, F. et al. | 2013
- 339
-
Fast and Maliciously Secure Two-Party Computation Using the GPUFrederiksen, T.K. / Nielsen, J.B. et al. | 2013
- 357
-
Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic CurvesGuillevic, A. et al. | 2013
- 373
-
FROST: Forensic Recovery of Scrambled TelephonesMuller, T. / Spreitzenbarth, M. et al. | 2013
- 389
-
Attacking Atmel's CryptoMemory EEPROM with Special-Purpose HardwareWild, A. / Guneysu, T. / Moradi, A. et al. | 2013
- 405
-
Keystroke Timing Analysis of on-the-fly Web AppsTey, C.M. / Gupta, P. / Gao, D. / Zhang, Y. et al. | 2013
- 414
-
Terrorism in Distance Bounding: Modeling Terrorist-Fraud ResistanceFischlin, M. / Onete, C. et al. | 2013
- 432
-
CrowdShare: Secure Mobile Resource SharingAsokan, N. / Dmitrienko, A. / Nagy, M. / Reshetova, E. / Sadeghi, A.-R. / Schneider, T. / Stelle, S. et al. | 2013
- 441
-
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting SystemZagorski, F. / Carback, R.T. / Chaum, D. / Clark, J. / Essex, A. / Vora, P.L. et al. | 2013
- 458
-
Exposure-Resilient One-Round Tripartite Key Exchange without Random OraclesSuzuki, K. / Yoneyama, K. et al. | 2013
- 475
-
Public Key Exchange Using Semidirect Product of (Semi)GroupsHabeeb, M. / Kahrobaei, D. / Koupparis, C. / Shpilrain, V. et al. | 2013
- 487
-
Leakage Resilient IBE and IPE under the DLIN AssumptionKurosawa, K. / Phong, L.T. et al. | 2013
- 502
-
Batch Proofs of Partial KnowledgeHenry, R. / Goldberg, I. et al. | 2013
- 518
-
Efficient Signatures of Knowledge and DAA in the Standard ModelBernhard, D. / Fuchsbauer, G. / Ghadafi, E. et al. | 2013
- 534
-
Analysis and Improvement of Lindell's UC-Secure Commitment SchemesBlazy, O. / Chevalier, C. / Pointcheval, D. / Vergnaud, D. et al. | 2013
- 552
-
Primeless Factoring-Based Cryptography - Solving the Complexity Bottleneck of Public-Key Generation-Bogos, S. / Boureanu, I. / Vaudenay, S. et al. | 2013