Filters








98,975 Hits in 4.6 sec

A Constructive Perspective on Key Encapsulation [chapter]

Sandro Coretti, Ueli Maurer, Björn Tackmann
2013 Lecture Notes in Computer Science  
A key-encapsulation mechanism (KEM) is a cryptographic primitive that allows anyone in possession of some party's public key to securely transmit a key to that party.  ...  The goal of a KEM is to construct a resource that models a shared key available to the honest parties.  ...  Key-Encapsulation Mechanisms A key-encapsulation mechanism (KEM) with key space K is a triple of algorithms Π = (K, E, D).  ... 
doi:10.1007/978-3-642-42001-6_16 fatcat:jtdoh6gqf5ca7nt73m2monsryu

Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices [article]

Wenhao Liu, Maurizio Adriano Strangio, Shengbao Wang
2015 arXiv   pre-print
Efficient certificateless one-pass session key establishment protocols can be constructed from key encapsulation mechanisms (KEMs) by making use of tags and signcryption schemes.  ...  ., the second, named DKTUTS-CLSC-TKEM, is based on the direct key transport using a timestamp (DKTUTS) protocol first described by Zheng.  ...  In the CLC setting user private keys are constructed from two partial secrets: one generated by the KGC computed from the user's identity and a secret master key and a secret value chosen by the user itself  ... 
arXiv:1510.01446v1 fatcat:ey66f36rajhnvfe2l25vdmvqwy

Explication of object-oriented databases

Adair Dingle, David Umphress, Russ Moul
1998 Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education - SIGCSE '98  
. , Ambler defines three normal forms [l-3] . 1 ONE and 20NF promote the desired construction of objects in that they guarantee the encapsulation of attributes with related finctionality. 30NF restricts  ...  There, is no notion of uniqueness; nor is there any construct corresponding to the primary key.  ...  However, by looking at both types of databases from a software engineering perspective, the parallels quickly come to light.  ... 
doi:10.1145/273133.273155 dblp:conf/sigcse/DingleUM98 fatcat:4h7rjj3sbbbehfkcdkmrzjua6y

Combining patient, clinical and system perspectives in assessing performance in healthcare: an integrated measurement framework

Jean-Frederic Levesque, Kim Sutherland
2020 BMC Health Services Research  
They reflect four performance perspectives (patient, population, delivery organisation and system).  ...  Internationally, healthcare systems and researchers have used a variety of terms to categorise indicators of healthcare performance, however few frameworks are based on a theoretically-based conceptual  ...  A previous iteration of the framework was published in BHI reports, when the authors were employed by that organisation.  ... 
doi:10.1186/s12913-019-4807-5 pmid:31915001 pmcid:PMC6950882 fatcat:rlr4xe67ejhfviudksehawa5ey

Building Better Signcryption Schemes with Tag-KEMs [chapter]

Tor E. Bjørstad, Alexander W. Dent
2006 Lecture Notes in Computer Science  
To prove the effectiveness of this construction, we will provide several examples of secure signcryption tag-KEMs, including a brand new construction based on the Chevallier-Mames signature scheme [8]  ...  Signcryption schemes aim to provide all of the advantages of simultaneously signing and encrypting a message.  ...  The usual construction paradigm, known as the KEM-DEM construction, consists of two parts: a key encapsulation mechanism (KEM) and a data encapsulation mechanism (DEM).  ... 
doi:10.1007/11745853_32 fatcat:n5oqek2xu5devjcre535eia6dq

Recent developments in multifunctional hybrid nanoparticles: opportunities and challenges in cancer therapy

Carolina, Salvador Morales
2012 Frontiers in Bioscience (Elite Edition)  
The result is quantum-dots encapsulated in a lipid envelope. A modification of this procedure can be implemented to encapsulate more than one imaging agent in a single construct.  ...  Quantum dot-lipid hybrid nanoparticles is another construct in which imaging agents are encapsulated inside a lipid.  ... 
doi:10.2741/398 pmid:22201893 fatcat:axqusblf6baivj2x4bjfq3a42a

Construction and Exploration of Corporate Virtual Private Networks

Kai Peng
2012 Advanced Engineering Forum  
One solution is to use virtual private network when constructing enterprise information environment.  ...  From perspective of engineering, comparison between the construction of corporate VPN and tunneling protocol that realizes VPN is made.  ...  VPN based on IP simulates a private WAN to use IP mechanism, and is a technology that simulates a point-to-point line on the public data network through private tunnel technology.  ... 
doi:10.4028/www.scientific.net/aef.6-7.964 fatcat:uedsug6ffnci5i6gsggi2humzm

Verifiable Random Functions from Identity-Based Key Encapsulation [chapter]

Michel Abdalla, Dario Catalano, Dario Fiore
2009 Lecture Notes in Computer Science  
We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable.  ...  Our construction is of interest both from a theoretical and a practical perspective.  ...  Our VRF construction relies on a special class of identity based key encapsulation mechanisms that we call VRF suitable.  ... 
doi:10.1007/978-3-642-01001-9_32 fatcat:gr7ftwcwibcwphhml3rvas5qce

The Cyber Sensor Network

Michael O'Grady, Olga Murdoch, Dominic Carr, Rem Collier, Gregory O'Hare
2018 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)  
From a cyber perspective, a Cyber Sensor encompasses any dynamic data-producing entity on the WWW, including: • social networks, • dynamic data feeds, • sensor portals, as typified by, for example, Sensorpedia  ...  Such information diversity on the WWW may constitute a paradox.  ... 
doi:10.1109/dasc/picom/datacom/cyberscitec.2018.00076 dblp:conf/dasc/OGradyMCCO18 fatcat:5fy37i2me5bmjlyqpn4s235g2e

Externalisation and Internalization: A New Perspective on Agent Modularisation in Multi-Agent System Programming [chapter]

Alessandro Ricci, Michele Piunti, Mirko Viroli
2010 Lecture Notes in Computer Science  
Existing solutions typically propose some kinds of constructs -such as capabilities -to group and encapsulate in well-defined modules inside the agent different kinds of agent features, that depend on  ...  In this paper we introduce a further perspective, which can be considered complimentary to existing approaches, which accounts for externalizing some of such functionalities into the computational environment  ...  The artifact abstraction is a key concept on which is the contribution of this paper is based.  ... 
doi:10.1007/978-3-642-13338-1_3 fatcat:rxv7srmmkvcubnvphhybdbrb6m

Coordinating Distributed Operations [chapter]

Daniel Oppenheim, Saeed Bagheri, Krishna Ratakonda, Yi-Min Chee
2011 Lecture Notes in Computer Science  
This hub is constructed in a manner intended to directly identify and solve the two key fundamental challenges of cross enterprise collaboration.  ...  The key contribution of this manuscript is the presentation of a new model, centered on an intelligent hub, for coordinating the logistics of cross enterprise collaboration.  ...  Because of the provider encapsulation, a service plan is relatively simple from both process definition and management perspectives.  ... 
doi:10.1007/978-3-642-19394-1_24 fatcat:y5veakr6cjh6bf32bp746fddwq

Page 37 of Interpretation Vol. 55, Issue 1 [page]

2001 Interpretation  
and its own perspectives on justice.  ...  PREACHING AS DECONSTRUCTION Deconstruction is not a singular entity or activity that can be encapsulated in a single definition.  ... 

Metal-Organic Frameworks for Immobilizing Enzymes: Optimization and Improvement

Chao Zhong, Chao Zhong, Guorong Li, Zian Lin, Guorong Li, Zian Lin
2019 General Chemistry  
In this article, we focus on the recent advances of these composites, especially in the encapsulated strategies and mechanism, and future perspectives are discussed as well  ...  It is a favorable choice to immobilize the enzyme on solid supports to enhance its activity and stability.  ...  The construction of biocomposite nanomaterials, where biomolecules are encapsulated in nanostructured materials, remains a great challenging but promising area of research, due to the improved anti-denaturation  ... 
doi:10.21127/yaoyigc20190012 fatcat:kat7bwtojzadxdz5dgwrctl3ne

Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search

Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer, Hai Jin
2015 IEEE Transactions on Information Forensics and Security  
Finally, we present a generic SPCHS construction from anonymous identity-based encryption and collision-free full-identity malleable Identity-Based Key Encapsulation Mechanism (IBKEM) with anonymity.  ...  We construct a simple SPCHS scheme from scratch in which the ciphertexts have a hidden star-like structure.  ...  Our generic SPCHS is inspired by several interesting observations on Identity-Based Key Encapsulation Mechanism (IBKEM). In IBKEM, a sender encapsulates a key K to an intended receiver ID.  ... 
doi:10.1109/tifs.2015.2442220 fatcat:bxrrxul7tvc7dfnldbdxlwb6qa

Direct chosen ciphertext security from identity-based techniques

Xavier Boyen, Qixiang Mei, Brent Waters
2005 Proceedings of the 12th ACM conference on Computer and communications security - CCS '05  
Perhaps more surprisingly, we also show that our technique can be used to build a Key Encapsulation Mechanism (KEM) with full CCA2 security based only on the scheme of Boneh and Boyen, 1 which is only  ...  In this paper we describe two main constructions: a full encryption system based on the Waters adaptive-ID secure IBE, and a KEM based on the Boneh-Boyen selective-ID secure IBE.  ...  A detailed construction of the key encapsulation version of the threshold system may be found in Appendix D.  ... 
doi:10.1145/1102120.1102162 dblp:conf/ccs/BoyenMW05 fatcat:zpczvozwhfh3tc7e7k3d57n6ya
« Previous Showing results 1 — 15 out of 98,975 results