Sciweavers

2715 search results - page 437 / 543
» Database Publication Practices
Sort
View
NDSS
2003
IEEE
15 years 10 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
163
Voted
ELPUB
2003
ACM
15 years 10 months ago
The Diversity of Trends, Experiences and Approaches in Electronic Publishing: Evidences of a Paradigm Shift on Communication
Electronic publishing constitutes one of the most exciting themes nowadays, amongst academics, at least, though substantial effects of IT usage for communication purposes in other...
Sely Maria de Souza Costa, Ana Cristina Moreira
FSTTCS
2003
Springer
15 years 10 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
ICICS
2003
Springer
15 years 10 months ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
EUROCRYPT
2010
Springer
15 years 9 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...