-
1
-
-
33745134401
-
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
-
Advances in Cryptology, CRYPTO 2005, of, Springer-Verlag
-
M. Abdalla, M. Bellaro, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In. Advances in Cryptology - CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 205-222. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 205-222
-
-
Abdalla, M.1
Bellaro, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-Lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
2
-
-
0003739790
-
-
Jun
-
C. Alaettinoglu, C. Villamizar, E. Gerich, D. Kessens, D. Meyer, T. Bates, D. Karrenberg, and M. Terpstra. Routing Policy Specification Language (RPSL). RFC 2622, Jun 1999.
-
(1999)
Routing Policy Specification Language (RPSL). RFC 2622
-
-
Alaettinoglu, C.1
Villamizar, C.2
Gerich, E.3
Kessens, D.4
Meyer, D.5
Bates, T.6
Karrenberg, D.7
Terpstra, M.8
-
3
-
-
0342622841
-
-
Mar
-
T. Bates, E. Gerich, L. Joncheray, J.-M. Jouanigot, D. Karrenberg, M. Terpstra, and J. Yu. Representation of IP Routing Policies in a Routing Registry (ripe-81++). RFC 1786, Mar 1995.
-
(1995)
Representation of IP Routing Policies in a Routing Registry (ripe-81++). RFC 1786
-
-
Bates, T.1
Gerich, E.2
Joncheray, L.3
Jouanigot, J.-M.4
Karrenberg, D.5
Terpstra, M.6
Yu, J.7
-
5
-
-
33744908786
-
Privacy-Enhanced Searches Using Encrypted Bloom Filters
-
AT&T Labs, Research, Feb
-
S. M. Bellovin and W. R. Cheswick. Privacy-Enhanced Searches Using Encrypted Bloom Filters. Technical Report Draft, AT&T Labs - Research, Feb 2004.
-
(2004)
Technical Report Draft
-
-
Bellovin, S.M.1
Cheswick, W.R.2
-
6
-
-
35048901123
-
Public-Key Encryption with keyword Search
-
Advances in Cryptology, EUROCRYPT 2004, of, Springer-Verlag
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public-Key Encryption with keyword Search. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 506-522. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
7
-
-
0037623983
-
Identity-Based Encryption from the Weil Pairing
-
Mar
-
D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing, 32(3):586-615, Mar 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
35248874429
-
Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography
-
Advances in Cryptology, CRYPTO 2003, of, Springer-Verlag
-
X. Boyen. Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography. In Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 383-399. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
11
-
-
34247382752
-
-
K. Butler, T. Farley, and P. McDaniel. A Survey of BGP Security. Technical Report TD-5UGJ33, AT&T Labs - Research, Feb 2004.
-
K. Butler, T. Farley, and P. McDaniel. A Survey of BGP Security. Technical Report TD-5UGJ33, AT&T Labs - Research, Feb 2004.
-
-
-
-
12
-
-
34748812366
-
Privacy Preserving Keyword Searches on Romote Encrypted Data. Cryptology ePrint Archive
-
Report 2004/051, Available at
-
Y.-C. Chang and M. Mitzenmacher. Privacy Preserving Keyword Searches on Romote Encrypted Data. Cryptology ePrint Archive, Report 2004/051, 2004. Available at http://eprint.iacr.org/2004/051/.
-
(2004)
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
13
-
-
84921068281
-
On the Exact Security of Full Domain Hash
-
Advances in Cryptology, CRYPTO 2000, of, Springer-Verlag
-
J.-S. Coron. On the Exact Security of Full Domain Hash. In Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 229-235. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 229-235
-
-
Coron, J.-S.1
-
14
-
-
34247363892
-
Secure Indexes. Cryptology ePrint Archive
-
Report 2003/216, Available at
-
E.-J. Goh. Secure Indexes. Cryptology ePrint Archive, Report 2003/216, 2003. Available at http://sprint.iacr.org/2003/216/.
-
(2003)
-
-
Goh, E.-J.1
-
15
-
-
33745120364
-
Secure Conjunctive Keyword Search over Encrypted Data
-
Proceedings of the 2nd International Conference on Applied Cryptography and Network Security ACNS, of, Springer-Verlag
-
P. Golle, J. Staddon, and B. Waters. Secure Conjunctive Keyword Search over Encrypted Data. In Proceedings of the 2nd International Conference on Applied Cryptography and Network Security (ACNS), volume 3089 of Lecture Notes in Computer Science, pages 31-45. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
16
-
-
85180543778
-
Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing
-
Feb
-
G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. In Proceedings of the 10th Network and Distributed System Security Symposium (NDSS), Feb 2003.
-
(2003)
Proceedings of the 10th Network and Distributed System Security Symposium (NDSS)
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
18
-
-
34247369605
-
-
Internet Routing Registry
-
Internet Routing Registry. http://www.irr.net.
-
-
-
-
20
-
-
0033743163
-
Secure Border Gateway Protocol (S-BGP)
-
Apr
-
S. Kent, C. Lynn, and K. Seo. Secure Border Gateway Protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 18(4):582-592, Apr 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
21
-
-
21844446420
-
Topology-based Detection, of Anomalous BGP Messages
-
Sep
-
C. Kruegel, D. Mutz, W. Robertson, and F. Valeur. Topology-based Detection, of Anomalous BGP Messages. In Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID), Sep 2003.
-
(2003)
Proceedings of the Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
22
-
-
23944473052
-
The Exact Security of an Identity Based Signature and its Applications. Cryptology ePrint Archive
-
Report 2004/102, Available at
-
B. Libert and J.-J. Quisquater. The Exact Security of an Identity Based Signature and its Applications. Cryptology ePrint Archive, Report 2004/102, 2004. Available at http://eprint.iacr.org/2004/102.
-
(2004)
-
-
Libert, B.1
Quisquater, J.-J.2
-
27
-
-
23944469009
-
Public Key Encryption with Conjunctive Field Keyword Search
-
Proceedings of the 5th International Workshop on Information Security Applications WISA, of, Springer-Verlag
-
D. J. Park, K. Kim, and P. J. Lee. Public Key Encryption with Conjunctive Field Keyword Search. In Proceedings of the 5th International Workshop on Information Security Applications (WISA), volume 3325 of Lecture Notes in Computer Science, pages 73-86. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3325
, pp. 73-86
-
-
Park, D.J.1
Kim, K.2
Lee, P.J.3
-
29
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Advances in Cryptology, CRYPTO '84, of, Springer-Verlag
-
A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In. Advances in Cryptology - CRYPTO '84, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1984.
-
(1984)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
30
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
May
-
D. X. Song, D. Wagner, and A. Perrig. Practical Techniques for Searches on Encrypted Data. In Proceedings of IEEE Symposium, on Security and Privacy, pages 44-55, May 2000.
-
(2000)
Proceedings of IEEE Symposium, on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
31
-
-
34247393522
-
-
Stanford Applied Crypto Group
-
Stanford Applied Crypto Group. IBE Secure E-mail. http://crypto.stanford. edu/ibe/.
-
IBE Secure E-mail
-
-
-
32
-
-
83255186150
-
Listen and Whisper: Security Mechanisms for BGP
-
Mar
-
L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. H. Katz. Listen and Whisper: Security Mechanisms for BGP. In Proceedings of First Symposium on Networked Systems Design and Implementation (NSDI), Mar 2004.
-
(2004)
Proceedings of First Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.H.5
-
34
-
-
77952589508
-
Building an Encrypted and Searchable Audit Log
-
Feb
-
B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters. Building an Encrypted and Searchable Audit Log. In Proceedings of the 11th Network and Distributed System Security Symposium (NDSS), pages 205-214, Feb 2004,
-
(2004)
Proceedings of the 11th Network and Distributed System Security Symposium (NDSS)
, pp. 205-214
-
-
Waters, B.R.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
-
35
-
-
27544500277
-
Securing BGP Through Secure Origin BGP
-
Sep
-
R. White. Securing BGP Through Secure Origin BGP. The Internet Protocol Journal, 6(3):15-22, Sep 2003.
-
(2003)
The Internet Protocol Journal
, vol.6
, Issue.3
, pp. 15-22
-
-
White, R.1
-
36
-
-
0036922184
-
Detection of Invalid Routing Announcement in the Internet
-
Jun
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang. Detection of Invalid Routing Announcement in the Internet. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 59-68, Jun 2002.
-
(2002)
Proceedings of the International Conference on Dependable Systems and Networks (DSN)
, pp. 59-68
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.F.6
Zhang, L.7
|