Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Preneel, Bart Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  For some eyes only: protecting online information sharing
Beato F., Ion I., Čapkun S., Preneel B., Langheinrich M.  CODASPY 2013 (Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy, San Antonio, TX, Feb 18-20, 2013) 1-12, 2013.  Type: Proceedings

This paper addresses an interesting data security and privacy issue on online sharing platforms. The authors propose a carefully designed system with strong user-side encryption. A notable feature of this system is that the ciphertext ...
...
Jul 12 2013  
  A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
Wan Z., Ren K., Preneel B.  Wireless network security (Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, 62-67, 2008.  Type: Proceedings

The current challenge in wireless networking is providing users with flexibility and convenience, together with security and privacy, while they roam across several wireless networks. In this paper, Wan et al. discuss a secure roaming ...
...
Jul 2 2008  
  On the security of stepwise triangular systems
Wolf C., Braeken A., Preneel B. Designs, Codes and Cryptography 40(3): 285-302, 2006.  Type: Article

Let F be a finite field of q elements and P′ be a system of quadratic polynomials p1, ... , pm<...
...
Apr 11 2007  
  Hardware architectures for public key cryptography
Batina L., Örs S., Preneel B., Vandewalle J. Integration, the VLSI Journal 34(1-2): 1-64, 2003.  Type: Article

This is a very interesting and comprehensive survey of hardware architectures for public key cryptography, focusing on the most common types: Rivest, Shamir, Adleman (RSA) and elliptic curve cryptography. After a short introduction, wh...
...
Oct 22 2003  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy