Sciweavers

1769 search results - page 149 / 354
» Cryptography
Sort
View
117
Voted
ASM
2008
ASM
15 years 5 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
EUROPKI
2008
Springer
15 years 5 months ago
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
Real world healthcare systems are generally large and overly complex systems. Designing privacy-friendly protocols for such systems is a challenging task. In this paper we present ...
Bart De Decker, Mohamed Layouni, Hans Vangheluwe, ...
131
Voted
RIVF
2008
15 years 4 months ago
Quantum key distribution system using dual-threshold homodyne detection
In this work we present the principles of a flexible quantum key distribution (QKD) system using quadraturephase-shift-keying (QPSK) base and symbol encoding and dualthreshold bala...
Qing Xu 0006, Manuel Sabban, Philippe Gallion, Fra...
IJIT
2004
15 years 4 months ago
Practical Fair Anonymous Undeniable Signatures
We present a new model for undeniable signatures: fair-anonymous undeniable signatures. This protocol can not only preserve the privacy of the signer (i.e. anonymity) but also trac...
Song Han, Elizabeth Chang, Xiaotie Deng, Winson K....
116
Voted
MSV
2004
15 years 4 months ago
On the Conversion between Number Systems
This brief revisits the problem of conversion between number systems and asks the following question: given a nonnegative decimal number , what is the value of the digit at positio...
Houssain Kettani