Sciweavers

2601 search results - page 196 / 521
» Secure Rewarding Schemes
Sort
View
131
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
15 years 5 months ago
Template Protection for PCA-LDA-based 3D Face Recognition Systems
: Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used bio...
Daniel Hartung
IADIS
2003
15 years 4 months ago
E-Democracy: Internet Voting
Voting via the Internet is part of electronic government and electronic democracy. However, there are many obstacles which have to be overcome, especially legal restrictions have ...
Guido Schryen
130
Voted
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
15 years 9 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup
130
Voted
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
15 years 9 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara