Sciweavers

220 search results - page 2 / 44
» Verifying a signature architecture: a comparative case study
Sort
View
EUROSYS
2006
ACM
14 years 2 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
PPDP
2005
Springer
13 years 10 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...
EUROMED
2010
13 years 3 months ago
Accuracy Verification of Manual 3D CG Reconstruction: Case Study of Destroyed Architectural Heritage, Bam Citadel
Abstract. We explain our approach for verifying the accuracy of 3D CG manual modeling of the Citadel of Bam, which is an architectural heritage site destroyed by an earthquake in 2...
Mohammad Reza Matini, Kinji Ono
ICICS
2005
Springer
13 years 10 months ago
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream
Abstract. Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may ...
Tieyan Li, Huafei Zhu, Yongdong Wu
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
13 years 9 months ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay