Sciweavers

126
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
ACISP
2001
Springer
15 years 7 months ago
Error Detection and Authentication in Quantum Key Distribution
Akihiro Yamamura, Hirokazu Ishizuka
123
Voted
ACISP
2003
Springer
15 years 7 months ago
Digital Signature Schemes with Restriction on Signing Capability
In some practical circumstances, the ability of a signer should be restricted. In group signature schemes, a group member may be allowed to generate signatures up to a certain numb...
Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jo...
104
Voted
ACISP
2003
Springer
15 years 7 months ago
Separating Encryption and Key Issuance in Digital Rights Management Systems
Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go ...
104
Voted
ACISP
2003
Springer
15 years 7 months ago
Grouping Verifiable Content for Selective Disclosure
Abstract. This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more ...
Laurence Bull, David McG. Squire, Jan Newmarch, Yu...