Sciweavers

46 search results - page 5 / 10
» More Practical and Secure History-Independent Hash Tables
Sort
View
IDTRUST
2010
ACM
14 years 8 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
68
Voted
SAC
2006
ACM
15 years 3 months ago
BambooTrust: practical scalable trust management for global public computing
Global public computing platforms, such as PlanetLab, grid computing systems, and XenoServers, require facilities for managing trust to allow their participants to interact effect...
Evangelos Kotsovinos, Aled Williams
DIM
2005
ACM
14 years 11 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
ASIACRYPT
2000
Springer
15 years 1 months ago
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message us...
Jean-Sébastien Coron, François Koeun...
INDOCRYPT
2001
Springer
15 years 2 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer