Sciweavers

2601 search results - page 26 / 521
» Secure Rewarding Schemes
Sort
View
SAINT
2003
IEEE
15 years 5 months ago
On Ubiquitous Network Security and Anomaly Detection
As networking trends move toward ubiquitous structuring schemes, the problem of security has taken on an increasingly important role. As a result, we must look to new security par...
Colin Van Dyke, Çetin Kaya Koç
ASIACRYPT
2000
Springer
15 years 4 months ago
Unconditionally Secure Digital Signature Schemes Admitting Transferability
A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new gen...
Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hi...
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack
Abstract. The paradigms currently used to realize symmetric encryption schemes secure against adaptive chosen ciphertext attack (CCA) try to make it infeasible for an attacker to f...
Anand Desai
SACRYPT
2005
Springer
146views Cryptology» more  SACRYPT 2005»
15 years 5 months ago
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
In a hierarchical structure, an entity has access to another if and only if the former is a superior of the later. The access control scheme for a hierarchy represented by a partia...
Jiang Wu, Ruizhong Wei
FUIN
2008
82views more  FUIN 2008»
14 years 12 months ago
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme
We introduce Nuovo DRM, a digital rights management scheme aimed to provide formal and practical security. The scheme is based on a recent DRM scheme, which we formally specify in ...
Muhammad Torabi Dashti, Srijith Krishnan Nair, Hug...