Sciweavers

446 search results - page 55 / 90
» On Anonymity of Group Signatures
Sort
View
TIFS
2010
130views more  TIFS 2010»
14 years 6 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
CVPR
2008
IEEE
16 years 1 months ago
ANSIG - An analytic signature for permutation-invariant two-dimensional shape representation
Many applications require a computer representation of 2D shape, usually described by a set of 2D points. The challenge of this representation is that it must not only capture the...
José J. Rodrigues, Pedro M. Q. Aguiar, Jo&a...
MFCS
2010
Springer
14 years 10 months ago
A dexptime-Complete Dolev-Yao Theory with Distributive Encryption
In the context of modelling cryptographic tools like blind signatures and homomorphic encryption, the DolevYao model is typically extended with an operator over which encryption i...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
DBSEC
1998
115views Database» more  DBSEC 1998»
15 years 1 months ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...
APAL
2008
93views more  APAL 2008»
14 years 12 months ago
Arithmetic of Dedekind cuts of ordered Abelian groups
We study Dedekind cuts on ordered Abelian groups. We introduce a monoid structure on them, and we characterise, via a suitable representation theorem, the universal part of the th...
Antongiulio Fornasiero, Marcello Mamino