Sciweavers

2601 search results - page 502 / 521
» Secure Rewarding Schemes
Sort
View
INDOCRYPT
2001
Springer
15 years 4 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
PKC
2010
Springer
210views Cryptology» more  PKC 2010»
15 years 3 months ago
Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem
Abstract. In this paper, we fully break the Algebraic Surface Cryptosystem (ASC for short) proposed at PKC’2009 [3]. This system is based on an unusual problem in multivariate cr...
Jean-Charles Faugère, Pierre-Jean Spaenleha...
FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 3 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
COLCOM
2009
IEEE
15 years 3 months ago
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
Mahendra Kumar, Richard E. Newman, José For...