نشرت في: December 2010
This article presents new protocols for onion routing anonymity networks. We define a provably secure privacy-preserving key agreement scheme in an i...
Storage-based intrusion detection consists of storage systems watching for and identifying data access patterns characteristic of system intrusions....
Attribute-Based Messaging (ABM) enables messages to be addressed using attributes of recipients rather than an explicit list of recipients. Such mess...
Query authentication is an essential component in Outsourced DataBase (ODB) systems. This article introduces efficient index structures for authentic...
We revisit the problem of constructing a protocol for performing Authenticated Encryption with Associated Data (AEAD). A technique is described which...