Sciweavers

CCS
2001
ACM
13 years 8 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas
CCS
2001
ACM
13 years 8 months ago
A verifiable secret shuffle and its application to e-voting
We present a mathematical construct which provides a cryptographic protocol to verifiably shuffle a sequence of k modular integers, and discuss its application to secure, universa...
C. Andrew Neff
CCS
2001
ACM
13 years 8 months ago
A Chinese wall security model for decentralized workflow systems
Keywords
Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzole...
CCS
2001
ACM
13 years 9 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
CCS
2001
ACM
13 years 9 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
CCS
2001
ACM
13 years 9 months ago
OCB: a block-cipher mode of operation for efficient authenticated encryption
Phillip Rogaway, Mihir Bellare, John Black, Ted Kr...
CCS
2001
ACM
13 years 9 months ago
Tangler: a censorship-resistant publishing system based on document entanglements
We describe the design of a censorship-resistant system that employs a unique document storage mechanism. Newly published documents are dependent on the blocks of previously publi...
Marc Waldman, David Mazières
CCS
2001
ACM
13 years 9 months ago
The BiBa one-time signature and broadcast authentication protocol
Ï ÒØÖÓ Ù Ø × Ò ØÙÖ × Ñ ¸ Ò Û × Ò ØÙÖ ÓÒ×ØÖÙ Ø ÓÒ Ø Ø Ù× × ÓÒ ¹Û Ý ÙÒ Ø ÓÒ× Û Ø ÓÙØ ØÖ Ô ÓÓÖ׺ ØÙÖ × ÐÓÛ Ú Ö ¬...
Adrian Perrig
CCS
2001
ACM
13 years 9 months ago
Twin signatures: an alternative to the hash-and-sign paradigm
David Naccache, David Pointcheval, Jacques Stern