Results 91 to 100 of about 26,946 (315)
Identity-based Key-insulated Provable Multi-copy Data Possession in Multi-cloud Storage [PDF]
Provable data possession(PDP) allows users to verify that their outsourced data is intact without downloading all the data.To improve the availability and security of outsourced data,many users store multiple copies of their data on a single server.In ...
ZHOU Jie, WANG Huaqun
doaj +1 more source
Keyword-Based Delegable Proofs of Storage
Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files.
C Wang +11 more
core +1 more source
Abstract Research Summary Upfront payments are important financial resources startups seek to negotiate in technology alliances. This study unpacks how venture‐backed startups can benefit from their VC affiliations and obtain better payments. We develop a bargaining framework and argue that VCs can strengthen venture‐backed startups' hand in alliance ...
Ramakrishna Devarakonda +2 more
wiley +1 more source
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang +4 more
doaj +1 more source
Provably Secure Cryptographic Constructions
Modern cryptography has virtually no provably secure constructions. Starting from the first Diffie–Hellman key agreement protocol (Diffie & Hellman, 1976) and the first public key cryptosystemRSA (Rivest et al., 1978), not a single public key cryptographic protocol has been proven secure. Note, however, that there exist secure secret key protocols, e.g.
openaire +4 more sources
Another Look at Provable Security [PDF]
Many cryptographers believe that the only way to have confidence in the security of a cryptographic protocol is to have a mathematically rigorous proof that the protocol meets its stated goals under certain assumptions. However, it is often difficult to assess what such proofs really mean in practice especially if the proof is non-tight, the underlying
openaire +2 more sources
A Risk Manager for Intrusion Tolerant Systems: Enhancing HAL 9000 With New Scoring and Data Sources
ABSTRACT Background Intrusion Tolerant Systems (ITS) aim to maintain system security despite adversarial presence by limiting the impact of successful attacks. Current ITS risk managers rely heavily on public databases like NVD and Exploit DB, which suffer from long delays in vulnerability evaluation, reducing system responsiveness. Objective This work
Tadeu Freitas +6 more
wiley +1 more source
Improvement on the XTP public key cryptosystem and communication protocol of provable security
A new trace function was proposed,the XTP public key cryptosystem based on the 3-rd order LFSR se-quence(the so-called XTR3 system) was extended to the XTR4 system based on the 4-th order LFSR sequence.XTR4 key was shorter in length than that of the XTR3
WANG Ze-hui
doaj +2 more sources
Provably Secure Masking of AES [PDF]
A general method to secure cryptographic algorithms against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking, using random values unknown to an adversary one masks the input to a cryptographic algorithm.
Jorge Guajardo +2 more
openaire +2 more sources
ABSTRACT This paper examines how legal and institutional frameworks influence bank financing for sustainable innovation among SMEs in the European Union (EU) and African Union (AU). Using institutional theory, it analyzes how coercive, normative, and mimetic pressures interact across international, regional, and domestic levels to shape green lending ...
Priscilla Akua Vitoh
wiley +1 more source

