Sciweavers

6574 search results - page 3 / 1315
» Current Signatures: Application
Sort
View
137
Voted
IJNSEC
2006
66views more  IJNSEC 2006»
15 years 3 months ago
On the Security of Signature Scheme with Message Recovery and Its Application
In 2004, Sekhar proposed a new signature scheme with message recovery. Based on this signature scheme with message recovery, they also proposed a designated verifier signature sch...
Eun-Jun Yoon, Kee-Young Yoo
134
Voted
ACSC
2004
IEEE
15 years 7 months ago
Visually Sealed and Digitally Signed Documents
One of the primary flaws with current digital signature technology is that a digital signature does not "feel" or resemble a traditional seal or personal signature to th...
Vicky Liu, William J. Caelli, Ernest Foo, Selwyn R...
139
Voted
CCS
2001
ACM
15 years 8 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
183
Voted
DSN
2011
IEEE
14 years 3 months ago
Communix: A framework for collaborative deadlock immunity
—We present Communix, a collaborative deadlock immunity framework for Java programs. Deadlock immunity enables applications to avoid deadlocks that they previously encountered. D...
Horatiu Jula, Pinar Tözün, George Candea
IEEEARES
2008
IEEE
15 years 10 months ago
Matching Policies with Security Claims of Mobile Applications
The Security-by-Contract (S×C) framework has been recently proposed to address the trust relationship problem of the current security model adopted for mobile devices. The key id...
Nataliia Bielova, Marco Dalla Torre, Nicola Dragon...