Detecting and Tracing Malicious Activities

  • Friday, April 24, 2015 | 9:00 AM – 9:50 AM | West | Room: 2000

View all Sessions

This session addresses two aspects of ensuring correct security behavior of network entities.
Topic 1: Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
Author: Essam Ghadafi 
Topic 2: Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption
Authors: Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura 


This document was retrieved from on Sun, 17 Dec 2017 16:11:51 -0500.
© 2017 EMC Corporation. All rights reserved.