Sciweavers

691 search results - page 113 / 139
» A New Security Model for Authenticated Key Agreement
Sort
View
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
15 years 5 months ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
EUROCRYPT
2007
Springer
15 years 5 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
WECWIS
1999
IEEE
102views ECommerce» more  WECWIS 1999»
15 years 5 months ago
Monitoring and Prediction of Network Performance
Analysis of network and application pegormance is traditionally based on mathematical models derived from first principles. Such models are usually complex, diflcult to use, and d...
Bjorn Frogner, Alexander B. Cannara
SIGUCCS
2003
ACM
15 years 6 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 7 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng