Sciweavers

181 search results - page 16 / 37
» Anonymous Proxy Signatures
Sort
View
GLOBECOM
2009
IEEE
15 years 4 months ago
Building Femtocell More Secure with Improved Proxy Signature
—Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP define new architecture and security requirement f...
Chan-Kyu Han, Hyoung-Kee Choi, In-Hwan Kim
ICCNMC
2005
Springer
15 years 3 months ago
Provable Security of ID-Based Proxy Signature Schemes
Chunxiang Gu, Yuefei Zhu
ICICS
2001
Springer
15 years 2 months ago
A Digital Nominative Proxy Signature Scheme for Mobile Communication
Based on the development of mobile communication, the future mobile communication systems are expected to provide higher quality of multimedia services for users than today’s sys...
Hee-Un Park, Im-Yeong Lee
ACSAC
2004
IEEE
15 years 1 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong