Sciweavers

29 search results - page 4 / 6
» acns 2008
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 7 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was...
Vladimir Shpilrain, Alexander Ushakov
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 4 days ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
14 years 4 days ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 4 days ago
The Security of EPC Gen2 Compliant RFID Protocols
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very b...
Mike Burmester, Breno de Medeiros
JGTOOLS
2008
137views more  JGTOOLS 2008»
13 years 5 months ago
Robust Soft Shadow Mapping with Backprojection and Depth Peeling
Abstract. Soft shadow mapping is an attractive solution to the problem of realtime soft shadows because it works with any kind of rasterizable geometry (in particular alpha-transpa...
Louis Bavoil, Steven P. Callahan, Cláudio T...