Skip to main content

and
Your search also matched 65 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating

Include preview-only content
  1. Chapter and Conference Paper

    Result Integrity Verification of Outsourced Frequent Itemset Mining

    The data-mining-as-a-service (DMaS) paradigm enables the data owner (client) that lacks expertise or computational resources to outsource its mining tasks to a third-party service provider (server). Outsourcing, ...

    Boxiang Dong, Ruilin Liu, Hui (Wendy) Wang in Data and Applications Security and Privacy… (2013)

  2. Chapter and Conference Paper

    Quantitative Security Risk Assessment of Android Permissions and Applications

    The booming of the Android platform in recent years has attracted the attention of malware developers. However, the permissions-based model used in Android system to prevent the spread of malware, has shown to...

    Yang Wang, Jun Zheng, Chen Sun in Data and Applications Security and Privacy… (2013)

  3. Chapter and Conference Paper

    TerraCheck: Verification of Dedicated Cloud Storage

    When hardware resources are shared between mutually distrustful tenants in the cloud, it may cause information leakage and bring difficulties to regulatory control. To address these concerns, cloud providers a...

    Zhan Wang, Kun Sun, Sushil Jajodia in Data and Applications Security and Privacy… (2013)

  4. Chapter and Conference Paper

    Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

    In DBSec’11, Li et al. showed that Kim and Chung’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version...

    Ding Wang, Chun-guang Ma, Peng Wu in Data and Applications Security and Privacy XXVI (2012)

  5. Chapter and Conference Paper

    Scalable Telemetry Classification for Automated Malware Detection

    Industry reports and blogs have estimated the amount of malware based on known malicious files. This paper extends this analysis to the amount of unknown malware. The study is based on 26.7 million files referenc...

    Jack W. Stokes, John C. Platt, Helen J. Wang in Computer Security – ESORICS 2012 (2012)

  6. Chapter and Conference Paper

    An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making

    The availability and reliability of large critical infrastructures depend on decisions made by hundreds or thousands of interdependent entities and, by extension, on the information that the entities exchange ...

    Yujue Wang, Carl Hauser in Critical Infrastructure Protection V (2011)

  7. Chapter and Conference Paper

    The Delicate Issues of Addition with Respect to XOR Differences

    In this paper we analyze the previous attacks on the block cipher SHACAL-1 and show that all the differential-based attacks fail due to mistreatment of XOR differences through addition. We show that the previo...

    Gaoli Wang, Nathan Keller, Orr Dunkelman in Selected Areas in Cryptography (2007)

  8. Chapter and Conference Paper

    Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme

    The one-way function tree (OFT) scheme proposed by Balenson et al. is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. Following Horng’s claim that the ...

    Xuxin Xu, Lingyu Wang, Amr Youssef, Bo Zhu in Applied Cryptography and Network Security (2007)

  9. Chapter and Conference Paper

    A More Natural Way to Construct Identity-Based Identification Schemes

    Constructing identification schemes is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify itself to a pub...

    Guomin Yang, **g Chen, Duncan S. Wong in Applied Cryptography and Network Security (2007)