Sciweavers

1834 search results - page 79 / 367
» Public Key Cryptography
Sort
View
ASIACRYPT
2004
Springer
15 years 4 months ago
On the Security of MOR Public Key Cryptosystem
In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nah...
SCN
2004
Springer
15 years 4 months ago
On the Security Notions for Public-Key Encryption Schemes
Duong Hieu Phan, David Pointcheval
WISA
2004
Springer
15 years 4 months ago
Public Key Encryption with Conjunctive Field Keyword Search
Dong Jin Park, Kihyun Kim, Pil Joong Lee
FSTTCS
2003
Springer
15 years 4 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
68
Voted
NOMS
2002
IEEE
15 years 4 months ago
Study of management on the mobile public key infrastructure
K. Kawamoto, N. Nakamura