Detecting and Tracing Malicious Activities

  • Friday, April 24, 2015 | 9:00 AM – 9:50 AM | West | Room: 2000

View all Sessions

This session addresses two aspects of ensuring correct security behavior of network entities.
Topic 1: Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Author: Essam Ghadafi 
Topic 2: Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Authors: Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura 


This document was retrieved from on Mon, 24 Jun 2019 05:23:18 -0400.