Sciweavers

2601 search results - page 35 / 521
» Secure Rewarding Schemes
Sort
View
ICISC
2001
98views Cryptology» more  ICISC 2001»
15 years 1 months ago
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks
In this paper, we propose a multi-signature scheme, in which each signer can express her intention associating with the message to be signed. Signers' intentions mean a kind o...
Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsu...
JCS
2007
84views more  JCS 2007»
14 years 11 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
15 years 6 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
IEEEIAS
2009
IEEE
15 years 6 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
TWC
2008
186views more  TWC 2008»
14 years 11 months ago
SLAB: A secure localized authentication and billing scheme for wireless mesh networks
Abstract--The future metropolitan-area wireless mesh networks (WMNs) are expected to contain compromise-prone Mesh Access Points (MAPs) with a high frequency of inter-domain roamin...
Haojin Zhu, Xiaodong Lin, Rongxing Lu, Pin-Han Ho,...