Sciweavers

ICICS
2001
Springer
13 years 10 months ago
Threshold Undeniable RSA Signature Scheme
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the concept of this special digital signature ten years ago. Up to now, however, almo...
Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Z...
ICICS
2001
Springer
13 years 10 months ago
Fair Electronic Cash Based on a Group Signature Scheme
Several new group signature schemes have been proposed in recent years. In addition, several applications for group signatures (including electronic cash) have been suggested. A ne...
Greg Maitland, Colin Boyd
ICICS
2001
Springer
13 years 10 months ago
A Digital Nominative Proxy Signature Scheme for Mobile Communication
Based on the development of mobile communication, the future mobile communication systems are expected to provide higher quality of multimedia services for users than today’s sys...
Hee-Un Park, Im-Yeong Lee
ICICS
2001
Springer
13 years 10 months ago
Enforcing Obligation with Security Monitors
With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressive...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira
ICICS
2001
Springer
13 years 10 months ago
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege leve...
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
Communications
Top of PageReset Settings