Sciweavers

6555 search results - page 927 / 1311
» Secure attribute-based systems
Sort
View
IJNSEC
2008
91views more  IJNSEC 2008»
15 years 4 months ago
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Tseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schem...
Luis Hernández Encinas, Ángel Mart&i...
IJNSEC
2008
112views more  IJNSEC 2008»
15 years 4 months ago
A New and Efficient Signature on Commitment Values
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo
KI
2008
Springer
15 years 4 months ago
Monitoring Movement Behavior by Means of a Large Area Proximity Sensor Array in the Floor
This paper describes an innovative sensor system which can detect and track people in a room by means of an array of capacitive sensors beneath the floor covering. By combining cut...
Axel Steinhage, Christl Lauterbach
ENTCS
2002
84views more  ENTCS 2002»
15 years 4 months ago
Set Types and Applications
We present pmlB, a programming language that includes primitive sets and associated operations. The language is equipped with a precise type discipline that statically captures dy...
Christian Skalka, Scott F. Smith
JIPS
2010
162views more  JIPS 2010»
14 years 11 months ago
Intercepting Filter Approach to Injection Flaws
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing depen...
Ahmed Salem