Semantic Scholar uses AI to extract papers important to this topic.
Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing… Expand Storage outsourcing is a rising trend which prompts a number of interesting security issues, many of which have been extensively… Expand Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party (a server) in a… Expand Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service… Expand We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third… Expand In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without… Expand Many emerging network applications are based upon a group communications model. As a result, securing group communications, i.e… Expand This document standardizes one particular Diffie-Hellman variant, based on the ANSI X9.42 draft, developed by the ANSI X9F1… Expand This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with… Expand A sound pressure level meter adapted for use in monitoring noise levels, particularly for use by law enforcement agencies wherein… Expand