Sciweavers

1286 search results - page 119 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
128
Voted
ESORICS
2009
Springer
16 years 1 months ago
Formal Indistinguishability Extended to the Random Oracle Model
Abstract. Several generic constructions for transforming one-way functions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of...
Cristian Ene, Yassine Lakhnech, Van Chan Ngo
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
15 years 6 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
88
Voted
DAM
2006
121views more  DAM 2006»
15 years 24 days ago
Fine-grained forward-secure signature schemes without random oracles
We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-...
Jan Camenisch, Maciej Koprowski
87
Voted
ACL
2010
14 years 10 months ago
Modeling Norms of Turn-Taking in Multi-Party Conversation
Substantial research effort has been invested in recent decades into the computational study and automatic processing of multi-party conversation. While most aspects of conversati...
Kornel Laskowski
121
Voted
ICCSA
2007
Springer
15 years 7 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...