Sciweavers

2601 search results - page 185 / 521
» Secure Rewarding Schemes
Sort
View
111
Voted
CTRSA
2007
Springer
112views Cryptology» more  CTRSA 2007»
15 years 9 months ago
Directed Transitive Signature Scheme
In 2002, Micali and Rivest raised an open problem as to whether directed transitive signatures exist or not. In 2003, Hohenberger formalized the necessary mathematical criteria for...
Xun Yi
89
Voted
CRYPTO
2006
Springer
107views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Cryptanalysis of 2R- Schemes
Abstract. In this paper, we study the security of 2Rschemes [17,18], which are the "minus variant" of two-round schemes. This variant consists in removing some of the n p...
Jean-Charles Faugère, Ludovic Perret
IJNSEC
2007
164views more  IJNSEC 2007»
15 years 3 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
133
Voted
PERCOM
2005
ACM
16 years 3 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
97
Voted
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 10 months ago
Lightweight Security for Network Coding
Abstract—Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different dat...
João P. Vilela, Luísa Lima, Jo&atild...