Sciweavers

12183 search results - page 103 / 2437
» Computers under Attacks!
Sort
View
SEC
2007
15 years 6 months ago
Security Remarks on a Convertible Nominative Signature Scheme
A nominative signature scheme allows a nominator (i.e. the signer) and a nominee (i.e. a designated verifier) to jointly generate and publish a signature so that only the nominee ...
Guilin Wang, Feng Bao
JCP
2007
122views more  JCP 2007»
15 years 4 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
APSCC
2007
IEEE
15 years 11 months ago
Transmission Time-Based Mechanism to Detect Wormhole Attacks
Tran Van Phuong, Ngo Trong Canh, Young-Koo Lee, Su...
COREGRID
2007
Springer
15 years 10 months ago
Threat Analysis and Attacks on XtreemOS: a Grid-enabled Operating System
Amit D. Lakhani, Erica Y. Yang, Brian Matthews, Ia...