Sciweavers

14824 search results - page 2899 / 2965
» Security - Introduction
Sort
View
ASIACRYPT
2003
Springer
15 years 2 months ago
Universal Designated-Verifier Signatures
Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a `Universal Designated-Verifier Signatur...
Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef...
ISSTA
2010
ACM
15 years 2 months ago
Strict control dependence and its effect on dynamic information flow analyses
Program control dependence has substantial impact on applications such as dynamic information flow tracking and data lineage tracing (a technique tracking the set of inputs that ...
Tao Bao, Yunhui Zheng, Zhiqiang Lin, Xiangyu Zhang...
ESAW
2000
Springer
15 years 2 months ago
Engineering Social Order
Social Order becomes a major problem in MAS and in computer mediated human interaction. After explaining the notions of Social Order and Social Control, I claim that there are mult...
Cristiano Castelfranchi
NGC
2000
Springer
15 years 2 months ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
EUROCRYPT
1997
Springer
15 years 2 months ago
Oblivious Transfers and Privacy Amplification
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
Gilles Brassard, Claude Crépeau
« Prev « First page 2899 / 2965 Last » Next »