Sciweavers

1230 search results - page 162 / 246
» On Abstraction in Scenarios
Sort
View
97
Voted
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
15 years 6 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
114
Voted
DCOSS
2005
Springer
15 years 6 months ago
A Distributed Greedy Algorithm for Connected Sensor Cover in Dense Sensor Networks
Abstract. Achieving optimal battery usage and prolonged network lifetime are two of the most fundamental issues in wireless sensor networks. By exploiting node and data redundancy ...
Amitabha Ghosh, Sajal K. Das
128
Voted
FC
2005
Springer
171views Cryptology» more  FC 2005»
15 years 6 months ago
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
Abstract. We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of sho...
Fangguo Zhang, Willy Susilo, Yi Mu
ICALP
2005
Springer
15 years 6 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
100
Voted
ICWE
2005
Springer
15 years 6 months ago
Discovering Re-usable Design Solutions in Web Conceptual Schemas: Metrics and Methodology
Abstract. In the Internet era, the development of Web applications has impressively evolved and is characterized by a large degree of complexity. To this end, software community ha...
Yannis Panagis, Evangelos Sakkopoulos, Spiros Sirm...