Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Carlo Brunetta"'
Publikováno v:
IEEE Access, Vol 12, Pp 68648-68667 (2024)
Vehicular Ad-Hoc Networks (VANETs) offer enhanced road safety, efficient traffic management, and improved vehicle connectivity while dealing with privacy and security challenges in public communication. In these networks, authentication mechanisms ar
Externí odkaz:
https://doaj.org/article/9a314802e17f4b6da6e35b8a36d69eff
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031313707
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b4e64997d37700c5d0fbefdc874a986c
https://doi.org/10.1007/978-3-031-31371-4_12
https://doi.org/10.1007/978-3-031-31371-4_12
Autor:
Carlo Brunetta, Pablo Picazo-Sanchez
Publikováno v:
Journal of Cryptographic Engineering. 12:123-135
Cryptanalysis is the development and study of attacks against cryptographic primitives and protocols. Many cryptographic properties rely on the difficulty of generating an adversary who, given an object sampled from one of two classes, correctly dist
Publikováno v:
Lecture Notes in Computer Science
ACISP 2021-The 26th Australasian Conference on Information Security and Privacy
ACISP 2021-The 26th Australasian Conference on Information Security and Privacy, Dec 2021, Virtual event, Australia. pp.510-528, ⟨10.1007/978-3-030-90567-5_26⟩
Information Security and Privacy
Information Security and Privacy, 13083, Springer International Publishing, pp.510-528, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-90567-5_26⟩
Information Security and Privacy ISBN: 9783030905668
ACISP
ACISP 2021-The 26th Australasian Conference on Information Security and Privacy
ACISP 2021-The 26th Australasian Conference on Information Security and Privacy, Dec 2021, Virtual event, Australia. pp.510-528, ⟨10.1007/978-3-030-90567-5_26⟩
Information Security and Privacy
Information Security and Privacy, 13083, Springer International Publishing, pp.510-528, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-90567-5_26⟩
Information Security and Privacy ISBN: 9783030905668
ACISP
We propose a novel primitive called \(\textsf {NIVA}\) that allows the distributed aggregation of multiple users’ secret inputs by multiple untrusted servers. The returned aggregation result can be publicly verified in a non-interactive way, i.e. t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a1a6122f75a2f7e2cc0a78619e84ec27
https://inria.hal.science/hal-03454325
https://inria.hal.science/hal-03454325
Publikováno v:
Information Security
Information Security, 13118, Springer International Publishing, pp.296-319, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-91356-4_16⟩
Lecture Notes in Computer Science ISBN: 9783030913557
Lecture Notes in Computer Science
ISC 2021-Information Security 24th International Conference
ISC 2021-Information Security 24th International Conference, Nov 2021, Held Virtually, France. pp.296-319, ⟨10.1007/978-3-030-91356-4_16⟩
Information Security, 13118, Springer International Publishing, pp.296-319, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-91356-4_16⟩
Lecture Notes in Computer Science ISBN: 9783030913557
Lecture Notes in Computer Science
ISC 2021-Information Security 24th International Conference
ISC 2021-Information Security 24th International Conference, Nov 2021, Held Virtually, France. pp.296-319, ⟨10.1007/978-3-030-91356-4_16⟩
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cebb9ab17f86fdb9fad84fb769e04983
https://hal.inria.fr/hal-03456382
https://hal.inria.fr/hal-03456382
Publikováno v:
Provable and Practical Security ISBN: 9783030904012
ProvSec
ProvSec
We introduce the concept of turn-based communication channel between two mutually distrustful parties with communication consistency, i.e. both parties have the same message history, and happens in sets of exchanged messages across a limited number o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0189035ff6383e611b272eb054ea1163
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100863306
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100863306
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030302146
ISC
ISC
Pseudo-random functions are a useful cryptographic primitive that, can be combined with zero-knowledge proof systems in order to achieve privacy-preserving identification. Libert et al. (ASIACRYPT 2017) has investigated the problem of proving the cor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe8589432b20a02d464a2cab8991201d
https://doi.org/10.1007/978-3-030-30215-3_9
https://doi.org/10.1007/978-3-030-30215-3_9
Publikováno v:
Cryptology and Network Security ISBN: 9783030004330
CANS
CANS
We consider the problem of privacy-preserving processing of outsourced data in the context of user-customised services. Clients store their data on a server. In order to provide user-dependent services, service providers may ask the server to compute
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::af676e2b1bf1d1eba052908c0efd1d34
https://doi.org/10.1007/978-3-030-00434-7_3
https://doi.org/10.1007/978-3-030-00434-7_3
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319696584
ISC
ISC
Encrypting data with a semantically secure cryptosystem guarantees that nothing is learned about the plaintext from the ciphertext. However, querying a database about individuals or requesting for summary statistics can leak information. Differential
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b7c41f53e80b89160f87305cb5d40afb
https://doi.org/10.1007/978-3-319-69659-1_17
https://doi.org/10.1007/978-3-319-69659-1_17
Publikováno v:
ICME Workshops
The widespread of social networking services allows users to share and quickly spread an enormous amount of digital contents. Currently, a low level of security and trustworthiness is applied to such information, whose reliability cannot be taken for