Filters








33 Hits in 8.5 sec

Public-Key Infrastructure [chapter]

2013 Wireless Mobile Internet Security  
In a nutshell, this is the PKI problem, and the papers presented herein propose new solutions and insight for these questions.  ...  All submissions underwent a thorough blind review by at least three PC members, resulting in a careful selection and revision of the accepted papers. The authors came from 10 countries  ...  Acknowledgements The author would like to thank Kjell Jørgen Hole for valuable help and encouragement in the analysis work, and the anonymous referees for many helpful comments. Acknowledgement  ... 
doi:10.1002/9781118512920.ch7 fatcat:hocfzfhi4rbuhmssop2hkwbc64

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
By providing data storage and management, cloud storage system becomes an indispensable part of the new era.  ...  The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world's digital economy are at the top of the tide.  ...  Shi et al [72] presented a KP-ABE scheme with direct revocation and verifiable ciphertext delegation.  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

Building high assurance secure applications using security patterns for capability-based platforms

Paul Rimba
2013 2013 35th International Conference on Software Engineering (ICSE)  
350 words maximum: (PLEASE TYPE) Building a secure software system is difficult and requires significant expertise and effort.  ...  Each pattern is defined in a new security pattern template which is based on previous pattern templates.  ...  with and credentials are not leaked.  ... 
doi:10.1109/icse.2013.6606727 dblp:conf/icse/Rimba04 fatcat:siskbwuma5bb7naos6ip3nszfy

Privacy and Data Protection by Design - from policy to engineering [article]

George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, Stefan Schiffner
2015 arXiv   pre-print
Furthermore, the report reflects limitations of the approach. It concludes with recommendations on how to overcome and mitigate these limits.  ...  Privacy and data protection constitute core values of individuals and of democratic societies.  ...  While we cannot name all, we would like to thank Sébastien Gambs and Rosa Barcelo for their feedback on drafts of this report.  ... 
arXiv:1501.03726v1 fatcat:csxvtyiiprhodnquaigppcwbwi

Peer-to-Peer-Based Social Networks: A Comprehensive Survey

Newton Masinde, Kalman Graffi
2020 SN Computer Science  
As a zero-trust alternative, peer-to-peer (P2P) technologies promise to support end-to-end communication, uncompromising access control, anonymity and resilience against censorship and massive data leaks  ...  The use of online social networks, such as Facebook and Twitter, has grown at a phenomenal rate.  ...  The EASiER scheme uses a proxy in every decryption to ensure the revoked contact is no longer able access data that requires the revoked attribute(s). There are two extensions to the EASiER scheme.  ... 
doi:10.1007/s42979-020-00315-8 fatcat:iwktgohkjbdalmalaj5h3lulri

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
A proxy encryption and a ciphertext-policy ABE scheme have designed by the authors of [201] for P2P storage cloud.  ...  The details of the types of attacks are given in the section II. Fig. 26 gives a brief overview for the types of existing and new types of attacks as a brief overview of future work.  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Applied cryptography: Protocols, algorithms, and source code in C

1994 Computer Law and Security Review  
After all of this, a, b, c, and d are added to A, B, C, D, respectively, and the algorithm continues with the next block of data. The final output is the concatenation of A, B, C, and D.  ...  FF (a, b, c, d, M 12 , 7, 0x6b901122) FF (d, a, b, c, M 13 Those constants, t i , were chosen as follows: In step i, t i is the integer part of 2 32 *abs(sin(i)), where i is in radians.  ...  Proxy signature schemes, based on different digital signature schemes, are in [1001] .  ... 
doi:10.1016/0267-3649(94)90017-5 fatcat:y5tchirflfdwno7dm4dv6ljx2a

Prêt à Voter Providing Everlasting Privacy [chapter]

Denise Demirel, Maria Henning, Jeroen van de Graaf, Peter Y. A. Ryan, Johannes Buchmann
2013 Lecture Notes in Computer Science  
Hugo Jonker for organising a PhD workshop on voting in 2012 at which the authors of this paper met and came up with the ideas for this paper.  ...  We thank the anonymous reviewers for their thorough reviews and appreciate the comments and suggestions.  ...  ., the scheme has another one: it does not allow revocation of credentials. In any new election, the number of eligible voters may change.  ... 
doi:10.1007/978-3-642-39185-9_10 fatcat:5dkjajb5rjfstef4csslxlu4cm

Towards a Privacy-Enhanced Social Networking Site

Esma Aïmeur, Sébastien Gambs, Ai Ho
2010 2010 International Conference on Availability, Reliability and Security  
With the wealth of activities available on SNS, the amount and variety of personal information shared is considerable and diverse.  ...  ABSTRACT The rise of Social Networking Sites (SNS), such as Facebook, Myspace, and LinkedIn has provided a platform for individuals to easily stay in touch with friends, family and colleagues and actively  ...  In a nutshell, group signature scheme is a form of anonymous credentials that allows multiple-show unlinkability.  ... 
doi:10.1109/ares.2010.97 dblp:conf/IEEEares/AimeurGH10 fatcat:r62lkrka6zaz3kihfmvkymoxhe

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
22 2:23, R 18 64) blood types on a DoD Web site, reportedly causing DoD to revisit what info to put on its Web pages (R 19 97); however, the following issue of FCW said that no such attack had occurred  ...  A few are of questionable authenticity, and are noted as such ("bogus???"). Please send me corrections and new cases, along with suitable references.  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
22 2:23, R 18 64) blood types on a DoD Web site, reportedly causing DoD to revisit what info to put on its Web pages (R 19 97); however, the following issue of FCW said that no such attack had occurred  ...  A few are of questionable authenticity, and are noted as such ("bogus???"). Please send me corrections and new cases, along with suitable references.  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
22 2:23, R 18 64) blood types on a DoD Web site, reportedly causing DoD to revisit what info to put on its Web pages (R 19 97); however, the following issue of FCW said that no such attack had occurred  ...  A few are of questionable authenticity, and are noted as such ("bogus???"). Please send me corrections and new cases, along with suitable references.  ...  Programming competency and the use of FORTH (R 20 49-53) + Spark, an attempt at a "safe" Ada subset (S 14 1) + Viper and formal methods used in Australian railroad switching (S 14 5) + Benefits of computer  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

What the Publisher Can Teach the Patient: Intellectual Property and Privacy in an Era of Trusted Privication

Jonathan Zittrain
2000 Social Science Research Network  
. 44 An individual authenticates herself to a jukebox-perhaps with a fingerprint or carefully scrawled signature on its back with a stylus-and then may access specific songs that fall under her monthly  ...  Lui-Kwan, Digital signatures: Recent Developments in Digital Signature Legislation and Electronic Commerce, 14 Berkeley Tech.  ... 
doi:10.2139/ssrn.214468 fatcat:noq34kduojd7nciwqk37pec2ea

Access denied: the practice and policy of global Internet filtering

2008 ChoiceReviews  
Though most foreign news sites were accessible, Web sites of some important Arabic newspapers and news portals were found to be blocked.  ...  The Arabic-and English-language sites of the unrecognized Reform Party of Syria were filtered, along with the Web sites of the Hizb al-Tahrir (Liberation Party)-an Islamist group that seeks to restore  ...  Uzbekistan blocks access to a relatively few though significant number of anonymizer and proxy sites, as does Vietnam, Myanmar, and Syria.  ... 
doi:10.5860/choice.45-6833 fatcat:qhuziwkinrdtldsaylvbmumopu

Strengthening trust in the identity life cycle [article]

Nicolas Buchmann, Universitätsbibliothek Der FU Berlin, Universitätsbibliothek Der FU Berlin
2019
The security of birth certificates is strengthened by a blockchain based system and a 2D barcode which stores biometric information.  ...  On the other hand, electronic travel documents are only one part of the document life cycle, since a passport can be obtained with an insecure birth certificate.  ...  A sample MSS tree with 128 layers yields a probability of roughly 2 −30 of leaf reuse. So the scheme gets presumably broken after 2 50 signatures without a new key setup.  ... 
doi:10.17169/refubium-1829 fatcat:23mb2ng5j5hddgpbmldt5xylfm
« Previous Showing results 1 — 15 out of 33 results