Sciweavers

2601 search results - page 65 / 521
» Secure Rewarding Schemes
Sort
View
COMPSEC
2000
117views more  COMPSEC 2000»
14 years 11 months ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
CORR
2000
Springer
93views Education» more  CORR 2000»
14 years 11 months ago
The Random Oracle Methodology, Revisited
We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing...
Ran Canetti, Oded Goldreich, Shai Halevi
ICICS
2005
Springer
15 years 5 months ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed ...
Qiang Tang, Chris J. Mitchell
CLEIEJ
2002
89views more  CLEIEJ 2002»
14 years 11 months ago
JaCoWeb Security - A CORBA Security Discretionary Prototype
This paper presents a CORBA Security discretionary prototype developed in the context of JaCoWeb Security Project. JaCoWeb Security Project is developing an authorization scheme f...
Carla Merkle Westphall, Joni da Silva Fraga, Miche...
ASIACRYPT
2008
Springer
15 years 1 months ago
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computa...
Goichiro Hanaoka, Kaoru Kurosawa