Detecting and Tracing Malicious Activities

  • Friday, April 24, 2015 | 9:00 AM – 9:50 AM | West | Room: 2000

View all Sessions

This session addresses two aspects of ensuring correct security behavior of network entities.
Topic 1: Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Author: Essam Ghadafi 
Topic 2: Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Authors: Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura 


This document was retrieved from on Fri, 28 Oct 2016 02:28:09 -0400.
© 2016 EMC Corporation. All rights reserved.