Results 21 to 30 of about 20,376 (274)
A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment
In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the patient’s physiological data in a wireless sensor network. In order to prevent unwarranted users from accessing the sensor network to obtain patients’ data, designing ...
Qingyun Xie, Zixuan Ding, Qi Xie
doaj +1 more source
Provably Secure Covert Communication on Blockchain
Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing number of related applications, such as smart contracts. The open nature of blockchain together
Juha Partala
doaj +1 more source
Efficient Side-Channel Secure Message Authentication with Better Bounds
We investigate constructing message authentication schemes from symmetric cryptographic primitives, with the goal of achieving security when most intermediate values during tag computation and verification are leaked (i.e., mode-level leakage-resilience).
Chun Guo +3 more
doaj +1 more source
Provably Secure Identity-based Conditional Proxy Re-encryption Scheme [PDF]
The conditional proxy re-encryption based on the traditional public key cryptosystem is mature,but the Identity-based Proxy Re-encryption(IBPRE) scheme,controlling agents’ permissions from the fine-grained level is a problem needed to be solved.Thus,this
YE Weiwei,OU Qingyu,WEI Wei
doaj +1 more source
Provably Secure Reflection Ciphers
sponsorship: This work was supported in part by the Research Council KU Leuven: GOA TENSE (C16/15/058). Tim Beyne and Yu Long Chen are supported by a Ph.D. Fellowship from the Research Foundation -Flanders (FWO). The authors thank the reviewers for their valuable comments and suggestions.
Beyne, Tim, Chen, Yu Long
openaire +1 more source
GUC-secure protocol for private relational join operator computing
It is one of important applications of secure multiparty computation that privacy-preserving SQL computation in distributed relational database.There are only few works dealing with provably-secure privacy-preserving data manipulations in contrast with ...
Yuan TIAN, Rong-xin SUN, Wu-yang CAI
doaj +2 more sources
Provably secure Rabin-p cryptosystem in hybrid setting [PDF]
In this work, we design an efficient and provably secure hybrid cryptosystem depicted by a combination of the Rabin-p cryptosystem with an appropriate symmetric encryption scheme.
Asbullah, Muhammad Asyraf +1 more
core +1 more source
Strong and Provably Secure Database Access Control
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints.
Basin, David +2 more
core +1 more source
Emergent Behavior in Cybersecurity [PDF]
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core +1 more source
DeepSecure: Scalable Provably-Secure Deep Learning [PDF]
This paper proposes DeepSecure, a novel framework that enables scalable execution of the state-of-the-art Deep Learning (DL) models in a privacy-preserving setting. DeepSecure targets scenarios in which neither of the involved parties including the cloud
Koushanfar, Farinaz +2 more
core +1 more source

