Sciweavers

24529 search results - page 293 / 4906
» Computing on Authenticated Data
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Formal Analysis of Time-Dependent Cryptographic Protocols in Real-Time Maude
This paper investigates the suitability of applying the general-purpose Real-Time Maude tool to the formal specification and model checking analysis of timedependent cryptographi...
Peter Csaba Ölveczky, Martin Grimeland
ESAS
2007
Springer
15 years 10 months ago
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators
The Direct Anonymous Attestation (DAA) scheme provides a means for remotely authenticating a trusted platform whilst preserving the user’s privacy. The protocol has been adopted ...
Ben Smyth, Mark Ryan, Liqun Chen
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
15 years 10 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
117
Voted
GCC
2007
Springer
15 years 10 months ago
A Resource-based Reputation Rating Mechanism for Peer-to-Peer Networks
As various kinds of peer-to-peer (P2P) applications become popular and widely known to people all around the world, research on P2P networks has received considerable interest. Re...
Huan Chen, Guihai Chen
AINA
2006
IEEE
15 years 10 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi