Sciweavers

954 search results - page 71 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
IEEEARES
2008
IEEE
15 years 4 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
ACSAC
2006
IEEE
15 years 3 months ago
An Internet Voting System Supporting User Privacy
This work introduces the A system1 , an Internetbased, free and open source electronic voting system which employs strong cryptography. Our system is a fully functiona...
Aggelos Kiayias, Michael Korman, David Walluck
FC
2005
Springer
80views Cryptology» more  FC 2005»
15 years 3 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
15 years 3 months ago
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
We answer the open question of the possibility of building a digital signature scheme with proven security based on the one-wayness of a trapdoor permutation and with signatures as...
Louis Granboulan
EUROCRYPT
2004
Springer
15 years 3 months ago
Short Signatures Without Random Oracles
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in g...
Dan Boneh, Xavier Boyen