Sciweavers

2363 search results - page 351 / 473
» How Secure is RFID
Sort
View
FC
1998
Springer
134views Cryptology» more  FC 1998»
15 years 9 months ago
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash
In this paper we construct a practical group blind signature scheme. Our scheme combines the already existing notions of blind signatures and group signatures. It is an extension o...
Anna Lysyanskaya, Zulfikar Ramzan
131
Voted
SACRYPT
1998
Springer
15 years 9 months ago
Computational Alternatives to Random Number Generators
In this paper, we present a simple method for generating random-based signatures when random number generators are either unavailable or of suspected quality (malicious or accident...
David M'Raïhi, David Naccache, David Pointche...
ICSE
1993
IEEE-ACM
15 years 9 months ago
Formal Approaches to Software Architecture
Over the past 15 years there has been increasing recognition that careful attention to the design of a system’s software architecture is critical to satisfying its requirements ...
David Garlan
127
Voted
ICCS
2007
Springer
15 years 8 months ago
Combining Classifiers for Web Violent Content Detection and Filtering
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Radhouane Guermazi, Mohamed Hammami, Abdelmajid Be...
139
Voted
APLAS
2004
ACM
15 years 8 months ago
History Effects and Verification
This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher-order programs. The ...
Christian Skalka, Scott F. Smith