Sciweavers

17 search results - page 1 / 4
» acns 2004
Sort
View
ACNS
2004
Springer
90views Cryptology» more  ACNS 2004»
13 years 8 months ago
Centralized Management of Virtual Security Zones in IP Networks
Antti Peltonen, Teemupekka Virtanen, Esa Turtiaine...
ACNS
2004
Springer
92views Cryptology» more  ACNS 2004»
13 years 9 months ago
Private Keyword-Based Push and Pull with Applications to Anonymous Communication
Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn ...
ACNS
2004
Springer
104views Cryptology» more  ACNS 2004»
13 years 9 months ago
Key Agreement Using Statically Keyed Authenticators
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. App...
Colin Boyd, Wenbo Mao, Kenneth G. Paterson
ACNS
2004
Springer
120views Cryptology» more  ACNS 2004»
13 years 8 months ago
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions
A general technique of batch verification for equality of discrete logarithms is proposed. Examples of batching threshold decryption schemes are presented based on threshold versio...
Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byou...