publié le: December 2010
Query authentication is an essential component in Outsourced DataBase (ODB) systems. This article introduces efficient index structures for authentic...
We revisit the problem of constructing a protocol for performing Authenticated Encryption with Associated Data (AEAD). A technique is described which...
This article describes MPSS, a new way to do proactive secret sharing. MPSS provides mobility: The group of nodes holding the shares of the secret ca...
Although Voice over IP (VoIP) is rapidly being adopted, its security implications are not yet fully understood. Since VoIP calls may traverse untrust...
With the growing adoption of Role-Based Access Control (RBAC) in commercial security and identity management products, how to facilitate the process...