Sciweavers

ACISP
2006
Springer
15 years 8 months ago
Towards an Invisible Honeypot Monitoring System
Anh-Quynh Nguyen, Yoshiyasu Takefuji
ACISP
2006
Springer
15 years 8 months ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt
ACISP
2006
Springer
15 years 8 months ago
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Abstract. A security proof in the Bellare
Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
ACMDIS
2004
ACM
15 years 8 months ago
I am driving through sound space
This paper describes the usage of a force feedback steering wheel interface in sound environments focusing on the example of sound.toy. Sound.toy is a student's project for c...
Carlos A. Rocha
ACISP
2006
Springer
15 years 8 months ago
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can pro...
Shanshan Duan, Zhenfu Cao