Sciweavers

39 search results - page 2 / 8
» The Use of Formal Methods for Trusted Digital Signature Devi...
Sort
View
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
13 years 6 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
ISN
1998
Springer
13 years 8 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
COMCOM
2010
129views more  COMCOM 2010»
13 years 4 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
NDSS
2002
IEEE
13 years 9 months ago
Experimenting with Server-Aided Signatures
This paper explores practical and conceptual implications of using Server-Aided Signatures (SAS). SAS is a signature method that relies on partially-trusted servers for generating...
Xuhua Ding, Daniele Mazzocchi, Gene Tsudik
FC
2009
Springer
100views Cryptology» more  FC 2009»
13 years 11 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung