Sciweavers

1117 search results - page 145 / 224
» A Compliance Model of Trust
Sort
View
EUROPKI
2007
Springer
15 years 5 months ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...
ICNP
2009
IEEE
14 years 11 months ago
Quality of Name Resolution in the Domain Name System
The Domain Name System (DNS) is integral to today's Internet. Name resolution for a domain is often dependent on servers well outside the control of the domain's owner. I...
Casey T. Deccio, Chao-Chih Chen, Jeff Sedayao, Kri...
ICFP
2012
ACM
13 years 4 months ago
Proof-producing synthesis of ML from higher-order logic
The higher-order logic found in proof assistants such as Coq and various HOL systems provides a convenient setting for the development and verification of pure functional program...
Magnus O. Myreen, Scott Owens
COOPIS
2002
IEEE
15 years 6 months ago
Supporting Peer-to-Peer User Communities
The paper describes a design of a peer-to-peer system which is being developed currently to support file and service (help, advise) sharing in research groups and groups of learner...
Julita Vassileva
IJIT
2004
15 years 3 months ago
Practical Fair Anonymous Undeniable Signatures
We present a new model for undeniable signatures: fair-anonymous undeniable signatures. This protocol can not only preserve the privacy of the signer (i.e. anonymity) but also trac...
Song Han, Elizabeth Chang, Xiaotie Deng, Winson K....