Sciweavers

6047 search results - page 885 / 1210
» Modeling with Extend
Sort
View
141
Voted
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
HOTOS
1997
IEEE
15 years 8 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad
FQAS
1998
Springer
133views Database» more  FQAS 1998»
15 years 8 months ago
Estimating the Quality of Databases
Abstract. With more and more electronic information sources becoming widely available, the issue of the quality of these often-competing sources has become germane. We propose a st...
Amihai Motro, Igor Rakov
ESWS
2010
Springer
15 years 9 months ago
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web
Abstract. With increasing usage of Social Networks, giving users the possibility to establish access restrictions on their data and resources becomes more and more important. Howev...
Philipp Kärger, Wolf Siberski
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
15 years 7 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...