Sciweavers

58 search results - page 1 / 12
» Low-Level Ideal Signatures and General Integrity Idealizatio...
Sort
View
ISW
2004
Springer
13 years 9 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
13 years 9 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
IACR
2011
112views more  IACR 2011»
12 years 4 months ago
A Domain Transformation for Structure-Preserving Signatures on Group Elements
We present a generic transformation that allows us to use a large class of pairing-based signatures to construct schemes for signing group elements in a structure preserving way. A...
Melissa Chase, Markulf Kohlweiss
COMSWARE
2007
IEEE
13 years 10 months ago
Integrated Data Location in Multihop Wireless Networks
Abstract— Multihop wireless networks are ideal as infrastructures for location-aware network applications, particularly for disaster recovery operations. However, one missing com...
Irfan Sheriff, Prashanth Aravinda Kumar Acharya, A...
JNW
2006
149views more  JNW 2006»
13 years 4 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo