Sciweavers

175 search results - page 3 / 35
» A Construction Kit for Modeling the Security of M-commerce A...
Sort
View
ICISC
2003
117views Cryptology» more  ICISC 2003»
13 years 6 months ago
Binary Tree Encryption: Constructions and Applications
Binary tree encryption (BTE), a relaxation of hierarchical identity-based encryption (HIBE), has recently emerged as a useful and intriguing primitive. On the one hand, the defini...
Jonathan Katz
ASIACRYPT
2000
Springer
13 years 9 months ago
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
Abstract. Construction of secure hyperelliptic curves is of most important yet most difficult problem in design of cryptosystems based on the discrete logarithm problems on hyperel...
Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shig...
CCS
2010
ACM
13 years 5 months ago
Synchronized aggregate signatures: new definitions, constructions and applications
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signa...
Jae Hyun Ahn, Matthew Green, Susan Hohenberger
EUROPKI
2007
Springer
13 years 9 months ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...
SEMWEB
2009
Springer
13 years 11 months ago
Reasoning in Metamodeling Enabled Ontologies
Ontologies are expected to play an important role in many application domains, as well as in software engineering in general. One problem with using ontologies within software engi...
Nophadol Jekjantuk, Gerd Gröner, Jeff Z. Pan