Sciweavers

10670 search results - page 39 / 2134
» Required Information Release
Sort
View
62
Voted
EUROPKI
2007
Springer
15 years 1 months ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...
90
Voted
APSCC
2010
IEEE
14 years 7 months ago
Service-centric Inference and Utilization of Confidence on Context
Abstract--The inadequate quality of context forces the context consumers in pervasive environments to reason about the quality and relevance of context to be confident of its worth...
Atif Manzoor, Hong Linh Truong, Christoph Dorn, Sc...
TIT
2011
125views more  TIT 2011»
14 years 4 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
TCOM
2010
83views more  TCOM 2010»
14 years 4 months ago
Early-Elimination Modification for Priority-First Search Decoding
Abstract--In order to release the growing demand for computational complexity with respect to increasing information sequence length in the priority-first search decoding algorithm...
Shin-Lin Shieh, Po-Ning Chen, Yunghsiang S. Han, T...
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...