Now showing items 1-4 of 4
Privacy-preserving targeted advertising scheme for IPTV using the cloud
(SciTe Press, 2012)
In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider ...
Modeling leakage of ephemeral secrets in tripartite/group key exchange
Recent advances in the design and analysis of secure two-party key exchange (2KE) such as the leakage of ephemeral secrets used during the attacked sessions remained unnoticed by the current models for group key exchange ...
Multi-party off-the-record messaging
(Association for Computing Machinery, 2009)
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation is no less important than secrecy and ...
Reusing static keys in key agreement protocols
Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we ...