Sciweavers

989 search results - page 140 / 198
» An information-based model for trust
Sort
View
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 11 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
PUC
2008
99views more  PUC 2008»
14 years 10 months ago
An empirical investigation of mobile ticketing service adoption in public transportation
In this paper, we present results from a study of mobile ticketing service adoption in public transportation. The theoretical background of the study is based on technology adoptio...
Niina Mallat, Matti Rossi, Virpi Kristiina Tuunain...
IJISEC
2010
87views more  IJISEC 2010»
14 years 9 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
OSDI
2002
ACM
15 years 11 months ago
Using Model Checking to Debug Device Firmware
Device firmware is a piece of concurrent software that achieves high performance at the cost of software complexity. They contain subtle race conditions that make them difficult t...
Sanjeev Kumar, Kai Li
SAC
2005
ACM
15 years 4 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla