Sciweavers

12 search results - page 2 / 3
» icic 2010
Sort
View
IJNSEC
2010
100views more  IJNSEC 2010»
12 years 11 months ago
On the Security of Yuan et al.'s Undeniable Signature Scheme
Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Wei Zhao
ICICS
2010
Springer
13 years 2 months ago
Proving Coercion-Resistance of Scantegrity II
By now, many voting protocols have been proposed that, among others, are designed to achieve coercion-resistance, i.e., resistance to vote buying and voter coercion. Scantegrity II...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
ICICS
2010
Springer
13 years 2 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
ICIC
2010
Springer
13 years 2 months ago
The Intelligent Music Editor: Towards an Automated Platform for Music Analysis and Editing
Digital music editing is a standard process in music production for correcting mistakes and enhancing quality, but this is tedious and timeconsuming. The Intelligent Music Editor, ...
Yuxiang Liu, Roger B. Dannenberg, Lianhong Cai
ICICS
2010
Springer
13 years 2 months ago
Fine-Grained Disclosure of Access Policies
Abstract. In open scenarios, where servers may receive requests to access their services from possibly unknown clients, access control is typically based on the evaluation of (cert...
Claudio Agostino Ardagna, Sabrina De Capitani di V...