Sciweavers

4820 search results - page 4 / 964
» Implementing Signatures for C
Sort
View
ACISP
2003
Springer
13 years 9 months ago
Digital Signature Schemes with Restriction on Signing Capability
In some practical circumstances, the ability of a signer should be restricted. In group signature schemes, a group member may be allowed to generate signatures up to a certain numb...
Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jo...
WWW
2003
ACM
14 years 6 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
ESMART
2001
Springer
13 years 10 months ago
Use of Biometrics for User Verification in Electronic Signature Smartcards
If a smartcard provides security functions such as electronic signature creation, valuables such as electronic money and/or sensitive data such as medical data, then the smartcard ...
Bruno Struif
SIGPLAN
2008
13 years 5 months ago
AspectC2C: a symmetric aspect extension to the C language
By separating crosscutting concerns into modules, aspectoriented programming (AOP) can greatly improve the maintainability, understandability and reusability of software. However,...
Danfeng Zhang, Yao Guo, Xiangqun Chen
PKC
1998
Springer
134views Cryptology» more  PKC 1998»
13 years 10 months ago
How (not) to Design RSA Signature Schemes
The concept of public-key cryptography was invented in 1976 by Diffie and Hellman [DH]. The following year, Rivest, Shamir and Adleman provided an implementation of this idea [RSA]...
Jean-François Misarsky