Download Now Free registration required
One of the central challenges in the development of distributed systems is the design of cryptographic protocols that meet the desired functional requirements and enforce the intended security properties. There is a common understanding that basic security properties such as secrecy and authentication can easily be enforced via encryption and digital signatures, respectively. Modern applications, however, exhibit more sophisticated and heterogeneous security requirements: for example, social networks, e-health systems, and reviewing systems must fulfill sophisticated access control, privacy, and anonymity constraints.
- Format: PDF
- Size: 152.2 KB