Sciweavers

102 search results - page 7 / 21
» A Formal Model of Identity Mixer
Sort
View
SCN
2010
Springer
176views Communications» more  SCN 2010»
14 years 7 months ago
The Fiat-Shamir Transform for Group and Ring Signature Schemes
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signat...
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi
CODES
2006
IEEE
15 years 3 months ago
A formal approach to robustness maximization of complex heterogeneous embedded systems
Embedded system optimization typically considers objectives such as cost, timing, buffer sizes and power consumption. Robustness criteria, i.e. sensitivity of the system to variat...
Arne Hamann, Razvan Racu, Rolf Ernst
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
12 years 12 months ago
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Abstract. In the standard setting of broadcast encryption, information about the receivers is transmitted as part of the ciphertext. In several broadcast scenarios, however, the id...
Nelly Fazio, Irippuge Milinda Perera
ASWEC
2008
IEEE
15 years 4 months ago
Experiences on the Belief-Theoretic Integration of Para-consistent Conceptual Models
Viewpoint-based conceptual modeling is concerned with the identification of a complete and coherent set of software models that have been developed with the involvement of variou...
Ebrahim Bagheri, Ali A. Ghorbani
JUCS
2008
149views more  JUCS 2008»
14 years 9 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng