Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Constantin Catalin Dragan"'
Publikováno v:
IET Information Security, Vol 15, Iss 4, Pp 282-296 (2021)
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges. The construction of secret sharing schemes for such
Autor:
Constantin Catalin Dragan, Francois Dupressoir, Ehsan Estaji, Kristian Gjosteen, Thomas Haines, Peter Y.A. Ryan, Peter B. Ronne, Morten Rotvold Solberg
Publikováno v:
2022 IEEE 35th Computer Security Foundations Symposium (CSF)
2022 IEEE 35th Computer Security Foundations Symposium (CSF), Aug 2022, Haifa, Israel. ⟨10.1109/CSF54842.2022.9919663⟩
2022 IEEE 35th Computer Security Foundations Symposium (CSF), Aug 2022, Haifa, Israel. ⟨10.1109/CSF54842.2022.9919663⟩
International audience; Privacy is a notoriously difficult property to achieve in complicated systems and especially in electronic voting schemes. Moreover, electronic voting schemes is a class of systems that require very high assurance. The literat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::98867021fc8c5c34f01991b5ea118033
https://hdl.handle.net/11250/3036708
https://hdl.handle.net/11250/3036708
Autor:
Constantin Catalin Dragan, François Dupressoir, Pascal Lafourcade, Ioana Boureanu, David Gerault
Publikováno v:
CSF
In relay attacks, a man-in-the-middle adversary impersonates a legitimate party and makes it this party appear to be of an authenticator, when in fact they are not. In order to counteract relay attacks, distance-bounding protocols provide a means for
Publikováno v:
Information Sciences. :75-85
The Chinese remainder theorem (CRT) is a fundamental theorem in number theory, widely used in cryptography to design secret sharing schemes. The CRT-based secret sharing schemes proposed so far make use of sequences of pairwise co-prime integers with
Publikováno v:
SAC
Under Know Your Customer (KYC) regulations, financial institutions are required to verify the identity and assess the trustworthiness of any new client during on-boarding, and maintain up-to-date records for risk management. These processes are time
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ea0d34875c169733bcc59c24d9d2ae8a
http://arxiv.org/abs/2001.01659
http://arxiv.org/abs/2001.01659
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030665036
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::be5dabeb4a89fc5a8ed902b64c900a08
https://doi.org/10.1007/978-3-030-66504-3
https://doi.org/10.1007/978-3-030-66504-3
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030578770
ACNS (2)
ACNS (2)
We introduce Biometric-Authenticated Keyword Search (BAKS), a novel searchable encryption scheme that relieves clients from managing cryptographic keys and relies purely on client’s biometric data for authenticated outsourcing and retrieval of file
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c6d0924e72251e75042b8de1331f6e3b
https://doi.org/10.1007/978-3-030-57878-7_3
https://doi.org/10.1007/978-3-030-57878-7_3
Publikováno v:
2019 IEEE European Symposium on Security and Privacy (EuroS&P)
EuroS&P 2019-4th IEEE European Symposium on Security and Privacy
EuroS&P 2019-4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden
EuroS&P
EuroS&P 2019-4th IEEE European Symposium on Security and Privacy
EuroS&P 2019-4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden
EuroS&P
International audience; Modern e-voting systems deploy cryptographic protocols on a complex infrastructure involving different computing platforms and agents. It is crucial to have appropriate specification and evaluation methods to perform rigorous
Autor:
Ioana Boureanu, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, Angela Sasse
This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging C
Publikováno v:
Information Sciences. 339:85-97
The concept of distributive weighted threshold access structure is introduced, which is an weighted threshold access structure where the participants are distributed on levels, the participants on the same level are assigned the same weight, and the