where the publication's user friendly name is tied to the publisher's cryptographic key. Security Design for an Inter-Domain Publish/Subscribe Architecture 175 5. 1 Security Mechanisms Most of existing network layer security proposals utilize hash chains
or cryptographic keys) into finitely many equivalence classes and to compute on those equivalence classes instead;(
Sensitive cryptographic keys, stored inside the token, should not be revealed to the outside and it should be impossible for an attacker to change those keys.
Cryptographers have designed schemes such as homomorphic encryption 9 that allow verifiable computation on encrypted data. However, the proposed schemes are too inefficient
Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st annual ACM symposium on Theory of computing, Bethesda, MD, USA.
< Back - Next >
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011