Sciweavers

2601 search results - page 171 / 521
» Secure Rewarding Schemes
Sort
View
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
16 years 7 days ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to â€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
IJNSEC
2006
122views more  IJNSEC 2006»
15 years 3 months ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti
125
Voted
INFORMATICALT
2002
118views more  INFORMATICALT 2002»
15 years 3 months ago
Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications
Recently, Park and Lim (1998) proposed two key distribution systems for secure VSAT satellite communications. One provides indirect authentication, and another scheme enables that ...
Yuh-Min Tseng
134
Voted
CCS
2007
ACM
15 years 9 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport
ASPLOS
2006
ACM
15 years 9 months ago
SecCMP: a secure chip-multiprocessor architecture
Security has been considered as an important issue in processor design. Most of the existing mechanisms address security and integrity issues caused by untrusted main memory in si...
Li Yang, Lu Peng