Menu

Detecting and Tracing Malicious Activities

  • Friday, April 24, 2015 | 9:00 AM – 9:50 AM | West | Room: 2000

View all Sessions

This session addresses two aspects of ensuring correct security behavior of network entities.
Topic 1: Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Author: Essam Ghadafi 
Topic 2: Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Authors: Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura 

Participants

This document was retrieved from http://www.rsaconference.com/events/us15/agenda/sessions/1766/detecting-and-tracing-malicious-activities on Sat, 22 Jul 2017 02:54:58 -0400.
© 2017 EMC Corporation. All rights reserved.