Cascaded Authorization with Anonymous-Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with Roberto Tamassia
SRDP: Securing Route Discovery in DSR Jihye Kim and Gene Tsudik Computer Science Department University of California at Irvine {Jihyek, gts}@ics.uci.edu
Geodesic: locally shortest path; straightest lines on surface ... Shortest paths to quasigeodesic do not touch or cross. Insertion of isosceles triangles ...
e-cash: By circulating information called coin, a payment from a user to a ... coin amount is kept secret, but correctness of amounts of old and new coins is ...
The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses ... Verify via experimental results (in PPLive) that pollution attack can be ...
Protect Data After It Is Collected. Disallowed queries are infeasible. Research questions: ... Disallowed queries are infeasible. Data query attempt. Data ...
Work supported in part by the National Science Foundation and by IAM ... credit card company's computers, in DMV's cabinets, in your bank, in your trash can ...
Anjum Reyaz-Ahmed The Internet today is ... a global marketplace for goods and services enabled by security mechanisms that ensure authentication, confidentiality and ...
On Privacy and Anonymity in Knowledge Externalization. Yuen-Yan Chan and Chi-Hong Leung ... Y. Chan, J. C. Wong, and A. C. Chan (2000) Anonymous Electronic ...
... and tracks functional recovery, and tests and challenges existing theories of rehabilitation. ... to adapt to this framework for backwards-compatibility ...
No OT in the Bare World. OTBARE cannot be secure since there is no crypto with ... If sender in the bare world learns c then sender of corresponding OTCOMB in ...
When some data creator U is subpoenaed, all his data should be revealed to the agency ... Only the creator can compute the tag, using his private key ...