Sciweavers

346 search results - page 18 / 70
» Security Arguments for Digital Signatures and Blind Signatur...
Sort
View
130
Voted
FLAIRS
2000
15 years 3 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
115
Voted
IJNSEC
2010
143views more  IJNSEC 2010»
14 years 8 months ago
Nonce Generation For The Digital Signature Standard
Digital Signature Algorithm (DSA) is an underlying algorithm to form a signature in the Digital Signature Standard (DSS). DSA uses a new random number (or nonce) each time a signa...
Rajendra S. Katti, Rajesh G. Kavasseri
ACISP
2001
Springer
15 years 6 months ago
Elliptic Curve Cryptography on a Palm OS Device
The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing ...
André Weimerskirch, Christof Paar, Sheuelin...
AISM
2004
15 years 3 months ago
Securing Web Services with XML aware Digital Signatures
The evolution of web services has facilitated the integration of business processes scattered across different geographical locations of the world. Along with the benefits that we...
Sabbir Ahmed, Leisa Armstrong
PPDP
2005
Springer
15 years 7 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...