Sciweavers

53 search results - page 2 / 11
» Cryptoschemes Based on New Signature Formation Mechanism
Sort
View
NDSS
2003
IEEE
13 years 11 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
ECIS
2000
13 years 7 months ago
The Exercise of Power and Information Systems Strategy: The Need for a New Perspective
- Computer based information systems (IS) in work-based organisation are generally acknowledged as incorporating a social as well as technical dimension. Information system strateg...
K. S. Horton
TON
2010
139views more  TON 2010»
13 years 26 days ago
KISS: Stochastic Packet Inspection Classifier for UDP Traffic
Abstract--This paper proposes KISS, a novel Internet classification engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applicati...
Aleaandro Finamore, Marco Mellia, Michela Meo, Dar...
IH
2004
Springer
13 years 11 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 15 days ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan