نتایج جستجو برای: proxy model

تعداد نتایج: 2124051  

Journal: :ITC 2017
Han-Yu Lin

This paper presents a novel proxy convertible multi-authenticated encryption (multi-AE) scheme and its variant with message linkages. The proposed scheme allows two or more original signers to cooperatively delegate their signing power to an authorized proxy signer, such that the proxy signer can generate a valid authenticated ciphertext on behalf of the original signing group and only a design...

2010
MARTIN P. TINGLEY PETER HUYBERS

Reconstructing the spatial pattern of a climate field through time from a dataset of overlapping instrumental and climate proxy time series is a nontrivial statistical problem. The need to transform the proxy observations into estimates of the climate field, and the fact that the observed time series are not uniformly distributed in space, further complicate the analysis. Current leading approa...

2003

Proxy-network based overlays have been proposed to protect Internet applications against Denial-of-Service (DoS) attacks by hiding an application’s location. We develop a formal framework which models attacks, defensive mechanisms, and proxy networks. We use the framework to analyze the general effectiveness of proxy network schemes to protect applications. Using our formal model, we analytical...

2014
Sirshendu Sekhar Ghosh Aruna Jain

The World Wide Web (WWW) is growing exponentially in terms of number of users and number of Web applications. Due to enormous traffic in the network and several factors like bandwidth availability, request processing time at server, round trip time and object size, the Web latency is increasing. The sophisticated integration of Web prefetching and caching deployed at proxy server with Web log m...

2017
Anupam Datta Matthew Fredrikson Gihyuk Ko Piotr Mardziel Shayak Sen

This paper presents an approach to formalizing and enforcing a class of use privacy properties in data-driven systems. In contrast to prior work, we focus on use restrictions on proxies (i.e. strong predictors) of protected information types. Our definition relates proxy use to intermediate computations that occur in a program, and identify two essential properties that characterize this behavi...

Journal: :Pervasive and Mobile Computing 2016
Jun Shao Rongxing Lu Xiaodong Lin Kaitai Liang

Bidirectional proxy re-encryption allows ciphertext transformation between Alice and Bob via a semi-trusted proxy, who however cannot obtain the corresponding plaintext. Due to this special property, bidirectional proxy re-encryption has become a flexible tool in many dynamic environments, such as cryptographic cloud storage. Nonetheless, how to design a secure and efficient bidirectional proxy...

Journal: :Datenschutz und Datensicherheit 2003
Stefan Köpsell Hannes Federrath Marit Hansen

An der TU Dresden wird seit September 2000 ein Anonymisierungsdienst betrieben, der ein weitgehend unbeobachtbares Surfen im Internet erlaubt. Mit bis zu 4000 Nutzern täglich erfreut sich dieser Dienst wachsender Beliebtheit und zählt inzwischen zu den fünf meistgenutzten Anonymisierungsdiensten dieser Art weltweit. Die für die Nutzung des Dienstes benötigte Client-Software JAP ist entstanden i...

Journal: :IACR Cryptology ePrint Archive 2017
Xiong Fan Feng-Hao Liu

Proxy re-encryption (PRE) and Proxy re-signature (PRS) were introduced by Blaze, Bleumer and Strauss [Eurocrypt ’98]. Basically, PRE allows a semi-trusted proxy to transform a ciphertext encrypted under one key into an encryption of the same plaintext under another key, without revealing the underlying plaintext. Since then, many interesting applications have been explored, and many constructio...

2013
P. Jomsri

Currently, web usage make a huge data from a lot of user attention. In general, proxy server is a system to support web usage from user and can manage system by using hit rates. This research tries to improve hit rates in proxy system by applying data mining technique. The data set are collected from proxy servers in the university and are investigated relationship based on several features. Th...

2008
Damien Vergnaud

In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive named proxy re-signatures where a proxy turns a signature computed under Alice’s secret key into one from Bob on the same message. The semi-trusted proxy does not learn either party’s signing key and cannot sign arbitrary messages on behalf of Alice or Bob. At CCS 2005, Ateniese and Hohenberger revisited the primitive by p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید