Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Pandu Rangan Chandrasekaran"'
Autor:
Akshayaram Srinivasan, Sharmila Deva Selvi Selvaraj, Pandu Rangan Chandrasekaran, Sree Vivek Sivanandam
Publikováno v:
Security and Communication Networks. 9:1650-1662
The indistinguishability of ciphertext under the chosen ciphertext attack IND-CCA2 is often considered to offer the strongest security notion for a public key encryption system. Nowadays, because of the availability of powerful malwares, an adversary
Autor:
Pandu Rangan Chandrasekaran, Naga Naresh Karuturi, S. Sree Vivek, S. Sharmila Deva Selvi, Ragavendran Gopalakrishnan
Publikováno v:
PST
Broadcast signcryption enables the broadcaster to simultaneously encrypt and sign the content meant for a specific set of users in a single logical step. It provides a very efficient solution to the dual problem of achieving confidentiality and authe
Publikováno v:
Provable Security ISBN: 9783540887324
ProvSec
ProvSec
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography, so as to avoid the key escrow problem inherent in the identity based system and cumbersome certificate management in public key infrastructur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::692d9bee9fd49d328bd0669d7ddc517e
https://doi.org/10.1007/978-3-540-88733-1_4
https://doi.org/10.1007/978-3-540-88733-1_4
Publikováno v:
Information Security and Privacy ISBN: 9783540734574
ACISP
ACISP
This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from player to player but can corrupt no more than t players at any given
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3510fcc3aa26c38e94a273673d8f4b84
https://doi.org/10.1007/978-3-540-73458-1_33
https://doi.org/10.1007/978-3-540-73458-1_33
Publikováno v:
Security, Privacy & Applied Cryptography Engineering (9783642412233); 2013, p130-146, 17p
Publikováno v:
Security, Privacy & Applied Cryptography Engineering (9783642412233); 2013, p111-129, 19p
Publikováno v:
Advances in Information & Computer Security: 4th International Workshop on Security, Iwsec 2009 Toyama, Japan, October 28-30, 2009 Proceedings; 2009, p71-88, 18p