Sciweavers

2601 search results - page 159 / 521
» Secure Rewarding Schemes
Sort
View
IFIP
2004
Springer
15 years 8 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
GMP
2003
IEEE
247views Solid Modeling» more  GMP 2003»
15 years 8 months ago
Message Recovery Signature Scheme Using Complementary Elliptic Curves
Elliptic curve cryptography is known for its complexity due to its discrete logarithm problem, and this gives advantage to the system used since the formula developed using this c...
Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari
ISCC
2003
IEEE
101views Communications» more  ISCC 2003»
15 years 8 months ago
A New Self-Healing Key Distribution Scheme
A self-healing key distributionscheme enables a group of users to establish a group key over an unreliable channel. In such a protocol, a group manager, to distributea session key...
Carlo Blundo, Paolo D'Arco, Massimiliano Listo
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
15 years 7 months ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith
ACISP
2010
Springer
15 years 4 months ago
Predicate-Based Key Exchange
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session ke...
James Birkett, Douglas Stebila