نتایج جستجو برای: deniable authentication

تعداد نتایج: 35051  

2010
Paolo Gasti Luigi V. Mancini

Today’s technical and legal landscape present formidable challenges to privacy. The disclosure of private data has become commonplace due to carelessness, theft or legal actions. Increasing reliance on network services causes sensitive data to be cached, copied, and archived by third parties, often without users’ knowledge or control. Cloud computing and ubiquitous computing are becoming an int...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

2011
Adam O'Neill Chris Peikert Brent Waters

In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted communication, to produce ‘fake’ (but legitimate-looking) random coins that open the ciphertext to another message. Deniability is a powerful notion for both practice and theory: apart from its inherent utility for re...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

2011
Jaydeep Howlader Vivek Nair Saikat Basu A. K. Mal

The uncoercibility to prevent rigging in e-voting and e-auction have been studied in different literatures. It is realized that the notion of a virtual booth and untappable channel are required to prevent coerciveness. Virtual booth protects the candidates to cast their private values without being observed by the adversary/coercer. However the adversary can influence the candidates after their...

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2011

2017
Yevgeniy Dodis Dario Fiore

Key Exchange (KE), which enables two parties (e.g., a client and a server) to securely establish a common private key while communicating over an insecure channel, is one of the most fundamental cryptographic primitives. In this work, we address the setting of unilaterally-authenticated key exchange (UAKE), where an unauthenticated (unkeyed) client establishes a key with an authenticated (keyed...

Journal: :Proceedings on Privacy Enhancing Technologies 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید