Sciweavers

369 search results - page 50 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
SASN
2003
ACM
15 years 5 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ICSM
2002
IEEE
15 years 4 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
MOBIQUITOUS
2007
IEEE
15 years 6 months ago
Securing Cooperative Transmission in Wireless Communications
Abstract— Cooperative transmission is an emerging communication technique that takes advantages of spatial diversity and broadcast natures of wireless channels to improve wireles...
Zhu Han, Yan Lindsay Sun
EUROPKI
2009
Springer
14 years 9 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
DRM
2004
Springer
15 years 5 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia