Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,365,043 papers from all fields of science
Search
Sign In
Create Free Account
Semantic security
Known as:
Semantically secure
, Semantically-secure
In cryptography, a cryptosystem is semantically secure if any probabilistic, polynomial-time algorithm (PPTA) that is given the ciphertext of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
Analysis of algorithms
Authenticated encryption
Averaging argument
Block cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead
Kai-Min Chung
,
Zhenming Liu
,
R. Pass
arXiv.org
2013
Corpus ID: 116059745
We demonstrate a simple, statistically secure, ORAM with computational overhead $\tilde{O}(\log^2 n)$; previous ORAM protocols…
Expand
2012
2012
Private Stream Search at the same communication cost as a regular search: Role of LDPC codes
M. Finiasz
,
K. Ramchandran
IEEE International Symposium on Information…
2012
Corpus ID: 13989851
Private Stream Search allows users to perform keyword-based queries to a database without revealing any information about the…
Expand
2011
2011
Secure transcoding for compressive multimedia sensing
Li-Wei Kang
,
Chih-Yang Lin
,
+4 authors
S. Pei
18th IEEE International Conference on Image…
2011
Corpus ID: 5819771
Compressive sensing (CS) has recently attracted much attention due to its unique feature of directly and simultaneously acquiring…
Expand
2011
2011
Semantic Security Policy Matching in Service Oriented Architectures
G. Modica
,
O. Tomarchio
IEEE World Congress on Services
2011
Corpus ID: 29953951
Cloud computing poses several new security andprivacy challenges, mainly related to resource sharing, interoperabilityand…
Expand
2010
2010
Receipt-Free K-out-of-L Voting Based on ElGamal Encryption
M. Hirt
Towards Trustworthy Elections
2010
Corpus ID: 11356854
We present a K-out-of-L voting scheme, i.e., a voting scheme that allows every voter to vote for (up to) K candidates from a set…
Expand
Highly Cited
2009
Highly Cited
2009
A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy
R. Lu
,
Xiaodong Lin
,
Haojin Zhu
,
P. Ho
,
Xuemin Shen
IEEE Transactions on Vehicular Technology
2009
Corpus ID: 5503263
Location privacy of mobile users (MUs) in wireless communication networks is very important. Ensuring location privacy for an MU…
Expand
2007
2007
Supporting creative product/commercial design with computer-based image retrieval
S. Westerman
,
S. Kaur
European Conference on Cognitive Ergonomics
2007
Corpus ID: 15928999
Motivation -- The task of creative product/commercial design can be supported by the retrieval of inspirational images from…
Expand
2006
2006
Secure Cross-Realm C2C-PAKE Protocol
Yingyuan Yin
,
Baojun Li
Australasian Conference on Information Security…
2006
Corpus ID: 206599049
Client-to-client password authenticated key exchange (C2C-PAKE) protocol deals with the authenticated key exchange process…
Expand
2004
2004
Access control in semantic grid
Guanying Bu
,
Zhiwei Xu
Future generations computer systems
2004
Corpus ID: 2497030
2001
2001
The emergence of texture: An analysis of the functions of the nominal demonstratives in an English interlanguage corpus
T. Murphy
2001
Corpus ID: 1041884
This study uses the concept of "emergent texture" to analyze the corpus behavior of the four nominal demonstratives -- this, that…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE