Sciweavers

2601 search results - page 405 / 521
» Secure Rewarding Schemes
Sort
View
ASIACRYPT
2003
Springer
15 years 8 months ago
Generalized Powering Functions and Their Application to Digital Signatures
This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayn...
Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Ka...
ACSAC
2002
IEEE
15 years 8 months ago
Voice over IPsec: Analysis and Solutions
In this paper we present the results of the experimental analysis of the transmission of voice over secure communication links implementing IPsec. Critical parameters characterizi...
Roberto Barbieri, Danilo Bruschi, Emilia Rosti
WECWIS
1999
IEEE
116views ECommerce» more  WECWIS 1999»
15 years 7 months ago
Towards a Scalable PKI for Electronic Commerce Systems
In an e-commerce system, security, in particular authentication, is of paramount importance. Public-key Infrastructure is often used to enforce authentication and the property of ...
Chenxi Wang, William A. Wulf
CSFW
2010
IEEE
15 years 7 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
EUC
2007
Springer
15 years 7 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...