Sciweavers

66 search results - page 1 / 14
» Proactive Public Key and Signature Systems
Sort
View
CCS
1997
ACM
13 years 9 months ago
Proactive Public Key and Signature Systems
Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki...
NDSS
2003
IEEE
13 years 11 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
13 years 10 months ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
13 years 7 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
ISADS
1999
IEEE
13 years 10 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao