Sciweavers

39 search results - page 7 / 8
» On the Security of Tag-KEM for Signcryption
Sort
View
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
13 years 8 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
GCC
2005
Springer
13 years 11 months ago
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing
As Grid technology evolves it is becoming evident that the inclusion of mobile devices in a Grid environment will benefit both the Grid and mobile network communities. Many mobile ...
Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Ki...
DASFAA
2003
IEEE
139views Database» more  DASFAA 2003»
13 years 11 months ago
Securing Your Data in Agent-Based P2P Systems
Peer-to-peer (P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobi...
Xiaolin Pang, Barbara Catania, Kian-Lee Tan
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
13 years 10 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
COMPSEC
2006
98views more  COMPSEC 2006»
13 years 6 months ago
A secure extension of the Kwak-Moon group signcryption scheme
Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert ...