Sciweavers

1190 search results - page 215 / 238
» Secure off-the-record messaging
Sort
View
108
Voted
ASIACRYPT
2001
Springer
15 years 5 months ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman
124
Voted
PKC
2001
Springer
116views Cryptology» more  PKC 2001»
15 years 5 months ago
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete l...
Hongjun Wu, Feng Bao, Robert H. Deng
90
Voted
FOCS
2000
IEEE
15 years 5 months ago
Private Quantum Channels
Shannon [Sha48, Sha49] in celebrated works had shown that n bits of shared key is necessary and sufficient to transmit n-bit classical information in an information-theoretically ...
Andris Ambainis, Michele Mosca, Alain Tapp, Ronald...
MA
1999
Springer
155views Communications» more  MA 1999»
15 years 5 months ago
JGram: Rapid Development of Multi-Agent Pipelines for Real-World Tasks
Many real-world tasks can be decomposed into pipelines of sequential operations (where subtasks may themselves be composed of one or more pipelines). JGram is a framework enabling...
Rahul Sukthankar, Antoine Brusseau, Ray Pelletier,...
CCGRID
2004
IEEE
15 years 4 months ago
A Java-based programming environment for hierarchical Grid: Jojo
Despite recent developments in higher-level middleware for the Grid supporting high level of ease-of-programming, hurdles for widespread adoption of Grids remain high, due to (1) ...
Hidemoto Nakada, Satoshi Matsuoka