Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,922,084 papers from all fields of science
Search
Sign In
Create Free Account
Provable security
Known as:
Provable
, Provably secure
, Security proof
Provable security refers to any type or level of security that can be proved. It is used in different ways by different fields. Usually, this refers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Adversary (cryptography)
Anti-tamper software
Antivirus software
BB84
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
One-to-many authentication for access control in mobile pay-TV systems
De-biao He
,
Neeraj Kumar
,
Han Shen
,
Jong‐Hyouk Lee
Science China Information Sciences
2016
Corpus ID: 14725824
In traditional authentication schemes for access control in mobile pay-TV systems, one-to-one delivery is used, i.e., one…
Expand
Highly Cited
2013
Highly Cited
2013
Resilient deployment of virtual network functions
M. Schöller
,
M. Stiemerling
,
A. Ripke
,
R. Bless
International Conference on Ultra Modern…
2013
Corpus ID: 23639112
Moving services to the cloud is a trend that has been going on for years now, with a constant increase in sophistication and…
Expand
Highly Cited
2010
Highly Cited
2010
Distributed Algorithms for Approximating Wireless Network Capacity
M. Dinitz
Proceedings IEEE INFOCOM
2010
Corpus ID: 11366805
In this paper we consider the problem of maximizing wireless network capacity (a.k.a. one-shot scheduling) in both the protocol…
Expand
Highly Cited
2009
Highly Cited
2009
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
Ian Molloy
,
Ninghui Li
,
Tiancheng Li
Ninth IEEE International Conference on Data…
2009
Corpus ID: 16963510
The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be…
Expand
Highly Cited
2007
Highly Cited
2007
A Direct Anonymous Attestation Scheme for Embedded Devices
H. Ge
,
S. Tate
International Conference on Theory and Practice…
2007
Corpus ID: 15100983
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its…
Expand
Highly Cited
2004
Highly Cited
2004
Secure implementation of identification systems
Samy Bengio
,
G. Brassard
,
Y. Desmedt
,
C. Goutier
,
J. Quisquater
Journal of Cryptology
2004
Corpus ID: 27865686
In this paper we demonstrate that widely known identification systems, such as the public-file-based Feige-Fiat-Shamir scheme…
Expand
Highly Cited
2004
Highly Cited
2004
Securing OLAP data cubes against privacy breaches
Lingyu Wang
,
S. Jajodia
,
D. Wijesekera
IEEE Symposium on Security and Privacy…
2004
Corpus ID: 167490
An OLAP (On-line Analytic Processing) system with insufficient security countermeasures may disclose sensitive information and…
Expand
Highly Cited
2004
Highly Cited
2004
On unequal error protection LDPC codes based on Plotkin-type constructions
Vidya Kumar
,
O. Milenkovic
IEEE Global Telecommunications Conference…
2004
Corpus ID: 6848217
A family of unequal error-protection (UEP) low-density parity-check (LDPC) codes, based on Plotkin-type constructions, is…
Expand
Highly Cited
1997
Highly Cited
1997
Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression
N. Memon
,
Xiaolin Wu
Computer/law journal
1997
Corpus ID: 5095134
In this paper we describe some recent developments that have taken place in context-based predictive coding, in response to the…
Expand
1994
1994
Provable strategies for vision-guided exploration in three dimensions
Kiriakos N. Kutulakos
,
C. Dyer
,
V. Lumelsky
Proceedings of the IEEE International Conference…
1994
Corpus ID: 7319628
An approach is presented for exploring an unknown, arbitrary surface in three-dimensional (3D) space by a mobile robot. The main…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE