Sciweavers

2601 search results - page 127 / 521
» Secure Rewarding Schemes
Sort
View
IEEEARES
2007
IEEE
15 years 9 months ago
Reliability Markov Chains for Security Data Transmitter Analysis
Security communication systems composed of highly reliable components may have few if any failures while undergoing heavy testing or field-usage. This paper combines (i) analysis ...
Calin Ciufudean, Bianca Satco, Constantin Filote
ICIC
2009
Springer
15 years 9 months ago
Group-Based Proxy Re-encryption Scheme
Recently, proxy re-encryption scheme received much attention. In this paper, we propose a proxy re-encryption used for divert ciphertext from one group to another. The scheme is bi...
Chunbo Ma, Jun Ao
AINA
2005
IEEE
15 years 8 months ago
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang
CISC
2007
Springer
117views Cryptology» more  CISC 2007»
15 years 7 months ago
An Efficient ID-Based Proxy Signature Scheme from Pairings
This paper proposes a new ID-based proxy signature scheme based on the bilinear pairings. The number of paring operation involved in the verification procedure of our scheme is onl...
Chunxiang Gu, Yuefei Zhu
IJNSEC
2007
89views more  IJNSEC 2007»
15 years 3 months ago
Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme
Rivest and Shamir presented two simple micropayment schemes, “PayWord” and “MicroMint,” for making small purchases over the Internet [14]. Recently, Adachi et al. have poi...
Minho Kim, Çetin Kaya Koç