Sciweavers

CANS
2007
Springer
118views Cryptology» more  CANS 2007»
13 years 8 months ago
Extended Private Information Retrieval and Its Application in Biometrics Authentications
Julien Bringer, Hervé Chabanne, David Point...
CANS
2007
Springer
142views Cryptology» more  CANS 2007»
13 years 8 months ago
Strongly Secure Certificateless Public Key Encryption Without Pairing
Yinxia Sun, Futai Zhang, Joonsang Baek
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
13 years 11 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
13 years 11 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...
CANS
2007
Springer
137views Cryptology» more  CANS 2007»
13 years 11 months ago
A Generic Construction for Universally-Convertible Undeniable Signatures
Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
CANS
2007
Springer
96views Cryptology» more  CANS 2007»
13 years 11 months ago
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...