Sciweavers

ISW
2009
Springer
13 years 11 months ago
Risks of the CardSpace Protocol
Sebastian Gajek, Jörg Schwenk, Michael Steine...
ISW
2009
Springer
13 years 11 months ago
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. De...
ISW
2009
Springer
13 years 11 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
ISW
2009
Springer
13 years 11 months ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...