[PDF][PDF] An overview of independent component analysis and its applications

GR Naik, DK Kumar - Informatica, 2011 - informatica.si
The problem of source separation is an inductive inference problem. There is not enough
information to deduce the solution, so one must use any available information to infer the …

Named data networking

L Zhang, A Afanasyev, J Burke, V Jacobson… - ACM SIGCOMM …, 2014 - dl.acm.org
Named Data Networking (NDN) is one of five projects funded by the US National Science
Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

K Liang, JK Liu, DS Wong, W Susilo - … 7-11, 2014. Proceedings, Part I 19, 2014 - Springer
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate
verification process. However, revocation remains as a daunting task in terms of ciphertext …

Revocable identity-based encryption revisited: Security model and construction

JH Seo, K Emura - Public-Key Cryptography–PKC 2013: 16th International …, 2013 - Springer
Abstract In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an
Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE) …

Adaptive-ID secure revocable identity-based encryption

B Libert, D Vergnaud - Topics in Cryptology–CT-RSA 2009: The …, 2009 - Springer
Abstract Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled
encryption as it eliminates the need for digital certificates. While revocation has been …

Server-aided revocable attribute-based encryption

H Cui, RH Deng, Y Li, B Qin - … : 21st European Symposium on Research in …, 2016 - Springer
As a one-to-many public key encryption system, attribute-based encryption (ABE) enables
scalable access control over encrypted data in cloud storage services. However, efficient …

Identity-based threshold decryption

J Baek, Y Zheng - International Workshop on Public Key Cryptography, 2004 - Springer
In this paper, we examine issues related to the construction of identity-based threshold
decryption schemes and argue that it is important in practice to design an identity-based …

Efficient revocation and threshold pairing based cryptosystems

B Libert, JJ Quisquater - Proceedings of the twenty-second annual …, 2003 - dl.acm.org
Boneh, Ding, Tsudik and Wong recently proposed a way for obtaining fast revocation of RSA
keys. Their method consists in using security mediators that keep a piece of each user's …

Server-aided revocable identity-based encryption

B Qin, RH Deng, Y Li, S Liu - … : 20th European Symposium on Research in …, 2015 - Springer
Efficient user revocation in Identity-Based Encryption (IBE) has been a challenging problem
and has been the subject of several research efforts in the literature. Among them, the tree …

Security-mediated certificateless cryptography

SSM Chow, C Boyd, JMG Nieto - Public Key Cryptography-PKC 2006: 9th …, 2006 - Springer
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows
more lightweight versions of mediated cryptography while maintaining the ability for …