Skip to search formSkip to main contentSkip to account menu

Provable security

Known as: Provable, Provably secure, Security proof 
Provable security refers to any type or level of security that can be proved. It is used in different ways by different fields. Usually, this refers… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
In traditional authentication schemes for access control in mobile pay-TV systems, one-to-one delivery is used, i.e., one… 
Highly Cited
2013
Highly Cited
2013
Moving services to the cloud is a trend that has been going on for years now, with a constant increase in sophistication and… 
2012
2012
For an increased level of scalability, availability and durability, some customers may want their data to be replicated on… 
Highly Cited
2010
Highly Cited
2010
  • M. Dinitz
  • 2010
  • Corpus ID: 11366805
In this paper we consider the problem of maximizing wireless network capacity (a.k.a. one-shot scheduling) in both the protocol… 
Highly Cited
2009
Highly Cited
2009
Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources, and no… 
Highly Cited
2009
Highly Cited
2009
The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be… 
2005
2005
This article deals with topological concepts and models which are necessary to represent three-dimensional urban objects in a… 
Highly Cited
2004
Highly Cited
2004
A family of unequal error-protection (UEP) low-density parity-check (LDPC) codes, based on Plotkin-type constructions, is… 
1994
1994
An approach is presented for exploring an unknown, arbitrary surface in three-dimensional (3D) space by a mobile robot. The main… 
Highly Cited
1994
Highly Cited
1994
Honeywell is completing integration of the new Boeing 777 integrated Airplane Information Management System (AIMS). AIMS…