A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Constructive Perspective on Key Encapsulation
[chapter]
2013
Lecture Notes in Computer Science
A key-encapsulation mechanism (KEM) is a cryptographic primitive that allows anyone in possession of some party's public key to securely transmit a key to that party. ...
The goal of a KEM is to construct a resource that models a shared key available to the honest parties. ...
Key-Encapsulation Mechanisms A key-encapsulation mechanism (KEM) with key space K is a triple of algorithms Π = (K, E, D). ...
doi:10.1007/978-3-642-42001-6_16
fatcat:jtdoh6gqf5ca7nt73m2monsryu
Efficient Certificateless Signcryption Tag-KEMs for Resource-constrained Devices
[article]
2015
arXiv
pre-print
Efficient certificateless one-pass session key establishment protocols can be constructed from key encapsulation mechanisms (KEMs) by making use of tags and signcryption schemes. ...
., the second, named DKTUTS-CLSC-TKEM, is based on the direct key transport using a timestamp (DKTUTS) protocol first described by Zheng. ...
In the CLC setting user private keys are constructed from two partial secrets: one generated by the KGC computed from the user's identity and a secret master key and a secret value chosen by the user itself ...
arXiv:1510.01446v1
fatcat:ey66f36rajhnvfe2l25vdmvqwy
Explication of object-oriented databases
1998
Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education - SIGCSE '98
. , Ambler defines three normal forms [l-3] . 1 ONE and 20NF promote the desired construction of objects in that they guarantee the encapsulation of attributes with related finctionality. 30NF restricts ...
There, is no notion of uniqueness; nor is there any construct corresponding to the primary key. ...
However, by looking at both types of databases from a software engineering perspective, the parallels quickly come to light. ...
doi:10.1145/273133.273155
dblp:conf/sigcse/DingleUM98
fatcat:4h7rjj3sbbbehfkcdkmrzjua6y
Combining patient, clinical and system perspectives in assessing performance in healthcare: an integrated measurement framework
2020
BMC Health Services Research
They reflect four performance perspectives (patient, population, delivery organisation and system). ...
Internationally, healthcare systems and researchers have used a variety of terms to categorise indicators of healthcare performance, however few frameworks are based on a theoretically-based conceptual ...
A previous iteration of the framework was published in BHI reports, when the authors were employed by that organisation. ...
doi:10.1186/s12913-019-4807-5
pmid:31915001
pmcid:PMC6950882
fatcat:rlr4xe67ejhfviudksehawa5ey
Building Better Signcryption Schemes with Tag-KEMs
[chapter]
2006
Lecture Notes in Computer Science
To prove the effectiveness of this construction, we will provide several examples of secure signcryption tag-KEMs, including a brand new construction based on the Chevallier-Mames signature scheme [8] ...
Signcryption schemes aim to provide all of the advantages of simultaneously signing and encrypting a message. ...
The usual construction paradigm, known as the KEM-DEM construction, consists of two parts: a key encapsulation mechanism (KEM) and a data encapsulation mechanism (DEM). ...
doi:10.1007/11745853_32
fatcat:n5oqek2xu5devjcre535eia6dq
Recent developments in multifunctional hybrid nanoparticles: opportunities and challenges in cancer therapy
2012
Frontiers in Bioscience (Elite Edition)
The result is quantum-dots encapsulated in a lipid envelope. A modification of this procedure can be implemented to encapsulate more than one imaging agent in a single construct. ...
Quantum dot-lipid hybrid nanoparticles is another construct in which imaging agents are encapsulated inside a lipid. ...
doi:10.2741/398
pmid:22201893
fatcat:axqusblf6baivj2x4bjfq3a42a
Construction and Exploration of Corporate Virtual Private Networks
2012
Advanced Engineering Forum
One solution is to use virtual private network when constructing enterprise information environment. ...
From perspective of engineering, comparison between the construction of corporate VPN and tunneling protocol that realizes VPN is made. ...
VPN based on IP simulates a private WAN to use IP mechanism, and is a technology that simulates a point-to-point line on the public data network through private tunnel technology. ...
doi:10.4028/www.scientific.net/aef.6-7.964
fatcat:uedsug6ffnci5i6gsggi2humzm
Verifiable Random Functions from Identity-Based Key Encapsulation
[chapter]
2009
Lecture Notes in Computer Science
We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. ...
Our construction is of interest both from a theoretical and a practical perspective. ...
Our VRF construction relies on a special class of identity based key encapsulation mechanisms that we call VRF suitable. ...
doi:10.1007/978-3-642-01001-9_32
fatcat:gr7ftwcwibcwphhml3rvas5qce
The Cyber Sensor Network
2018
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
From a cyber perspective, a Cyber Sensor encompasses any dynamic data-producing entity on the WWW, including: • social networks, • dynamic data feeds, • sensor portals, as typified by, for example, Sensorpedia ...
Such information diversity on the WWW may constitute a paradox. ...
doi:10.1109/dasc/picom/datacom/cyberscitec.2018.00076
dblp:conf/dasc/OGradyMCCO18
fatcat:5fy37i2me5bmjlyqpn4s235g2e
Externalisation and Internalization: A New Perspective on Agent Modularisation in Multi-Agent System Programming
[chapter]
2010
Lecture Notes in Computer Science
Existing solutions typically propose some kinds of constructs -such as capabilities -to group and encapsulate in well-defined modules inside the agent different kinds of agent features, that depend on ...
In this paper we introduce a further perspective, which can be considered complimentary to existing approaches, which accounts for externalizing some of such functionalities into the computational environment ...
The artifact abstraction is a key concept on which is the contribution of this paper is based. ...
doi:10.1007/978-3-642-13338-1_3
fatcat:rxv7srmmkvcubnvphhybdbrb6m
Coordinating Distributed Operations
[chapter]
2011
Lecture Notes in Computer Science
This hub is constructed in a manner intended to directly identify and solve the two key fundamental challenges of cross enterprise collaboration. ...
The key contribution of this manuscript is the presentation of a new model, centered on an intelligent hub, for coordinating the logistics of cross enterprise collaboration. ...
Because of the provider encapsulation, a service plan is relatively simple from both process definition and management perspectives. ...
doi:10.1007/978-3-642-19394-1_24
fatcat:y5veakr6cjh6bf32bp746fddwq
Page 37 of Interpretation Vol. 55, Issue 1
[page]
2001
Interpretation
and its own perspectives on justice. ...
PREACHING AS DECONSTRUCTION
Deconstruction is not a singular entity or activity that can be encapsulated in a single definition. ...
Metal-Organic Frameworks for Immobilizing Enzymes: Optimization and Improvement
2019
General Chemistry
In this article, we focus on the recent advances of these composites, especially in the encapsulated strategies and mechanism, and future perspectives are discussed as well ...
It is a favorable choice to immobilize the enzyme on solid supports to enhance its activity and stability. ...
The construction of biocomposite nanomaterials, where biomolecules are encapsulated in nanostructured materials, remains a great challenging but promising area of research, due to the improved anti-denaturation ...
doi:10.21127/yaoyigc20190012
fatcat:kat7bwtojzadxdz5dgwrctl3ne
Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search
2015
IEEE Transactions on Information Forensics and Security
Finally, we present a generic SPCHS construction from anonymous identity-based encryption and collision-free full-identity malleable Identity-Based Key Encapsulation Mechanism (IBKEM) with anonymity. ...
We construct a simple SPCHS scheme from scratch in which the ciphertexts have a hidden star-like structure. ...
Our generic SPCHS is inspired by several interesting observations on Identity-Based Key Encapsulation Mechanism (IBKEM). In IBKEM, a sender encapsulates a key K to an intended receiver ID. ...
doi:10.1109/tifs.2015.2442220
fatcat:bxrrxul7tvc7dfnldbdxlwb6qa
Direct chosen ciphertext security from identity-based techniques
2005
Proceedings of the 12th ACM conference on Computer and communications security - CCS '05
Perhaps more surprisingly, we also show that our technique can be used to build a Key Encapsulation Mechanism (KEM) with full CCA2 security based only on the scheme of Boneh and Boyen, 1 which is only ...
In this paper we describe two main constructions: a full encryption system based on the Waters adaptive-ID secure IBE, and a KEM based on the Boneh-Boyen selective-ID secure IBE. ...
A detailed construction of the key encapsulation version of the threshold system may be found in Appendix D. ...
doi:10.1145/1102120.1102162
dblp:conf/ccs/BoyenMW05
fatcat:zpczvozwhfh3tc7e7k3d57n6ya
« Previous
Showing results 1 — 15 out of 98,975 results