Sciweavers

954 search results - page 59 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
15 years 4 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas
ICIW
2008
IEEE
15 years 4 months ago
On Secure and Anonymous Buyer-Seller Watermarking Protocol
—Buyer-seller watermarking protocols incorporates digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer b...
Mina Deng, Bart Preneel
PKC
2005
Springer
192views Cryptology» more  PKC 2005»
15 years 3 months ago
Securing RSA-KEM via the AES
RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogo...
Jakob Jonsson, Matthew J. B. Robshaw
PKC
2005
Springer
94views Cryptology» more  PKC 2005»
15 years 3 months ago
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
In this paper, we first introduce a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes. Note that forgeability does not necessarily imply im...
Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
WETICE
1996
IEEE
15 years 2 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman