Sciweavers

2386 search results - page 151 / 478
» Database Security 2000
Sort
View
EUROCRYPT
1994
Springer
15 years 2 months ago
Designated Confirmer Signatures
Abstract. We construct the first O(1)-size designated confirmer signatures (DCS) with security in the state-of-the-art model of Camenisch and Michels, Eurocrypt 2000, without rando...
David Chaum
DIAU
2000
Springer
15 years 1 months ago
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
We present the traffic analysis problem and expose the most important protocols, attacks and design issues. Afterwards, we propose directions for further research. As we are mostl...
Jean-François Raymond
ESORICS
2000
Springer
15 years 1 months ago
A Formal Semantics for SPKI
We extend the logic and semantics of authorization due to Abadi, Lampson, et al. to support restricted delegation. Our formal model provides a simple interpretation for the variety...
Jon Howell, David Kotz
EUROCRYPT
2000
Springer
15 years 1 months ago
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
We show that although unconditionally secure quantum bit commitment is impossible, it can be based upon any family of quantum one-way permutations. The resulting scheme is uncondit...
Paul Dumais, Dominic Mayers, Louis Salvail
SODA
2000
ACM
105views Algorithms» more  SODA 2000»
14 years 11 months ago
Efficient dynamic traitor tracing
This presentation covers several sections of the paper by Berkman, Parnas and Sgall for the Advanced Topics in Network Security seminar. Ben-Gurion University of the Negev, fall 2...
Omer Berkman, Michal Parnas, Jiri Sgall