Sciweavers

1190 search results - page 112 / 238
» Secure off-the-record messaging
Sort
View
102
Voted
MIDDLEWARE
2007
Springer
15 years 7 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien
109
Voted
ACMICEC
2003
ACM
113views ECommerce» more  ACMICEC 2003»
15 years 6 months ago
PayCash: a secure efficient Internet payment system
This paper describes PayCash, an Internet payment system that was designed to offer strong security and privacy protection. This system is based on the concept of electronic cash,...
Jon M. Peha, Ildar M. Khamitov
111
Voted
DSN
2002
IEEE
15 years 6 months ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
115
Voted
ICDCS
2000
IEEE
15 years 5 months ago
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
The increasing popularity and diversity of collaborative applications prompts a need for highly secure and reliable communication platforms for dynamic peer groups. Security mecha...
Jonathan Robert Stanton, Yair Amir, Damian Hasse, ...
111
Voted
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 3 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen