Sciweavers

1777 search results - page 149 / 356
» Programming Cryptographic Protocols
Sort
View
ESORICS
2000
Springer
15 years 4 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
EUROCRYPT
1995
Springer
15 years 4 months ago
Verifiable Signature Sharing
Abstract. We introduce Verifiable Signature Sharing (VCS), a cryptographic primitive for protecting digital signatures. VCS enables the holder of a digitally signed document, who m...
Matthew K. Franklin, Michael K. Reiter
DRMTICS
2005
Springer
15 years 3 months ago
A Novel Framework for Multiple Creatorship Protection of Digital Movies
A digital movie can be created jointly under the cooperation of many creators. It is then necessary to provide protection to the creatorship of each participating creator. In this ...
Yu-Quan Zhang, Sabu Emmanuel
I3E
2001
196views Business» more  I3E 2001»
15 years 2 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
ASIAN
2009
Springer
299views Algorithms» more  ASIAN 2009»
15 years 2 months ago
Deducibility Constraints
In their work on tractable deduction systems, D. McAllester and later D. Basin and H. Ganzinger have identified a property of inference systems (the locality property) that ensures...
Sergiu Bursuc, Hubert Comon-Lundh, Stéphani...