Sciweavers

468 search results - page 85 / 94
» Security Weaknesses in Bluetooth
Sort
View
73
Voted
FECS
2006
103views Education» more  FECS 2006»
15 years 1 months ago
TMAS A Capstone Project
The College of Engineering and Computer Science at the University of Tennessee at Chattanooga (UTC) requires all undergraduate seniors to participate in a capstone project designe...
Joseph M. Kizza, Li Yang, Andy Novobilski, Kathy W...
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
15 years 13 days ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
IJISEC
2007
87views more  IJISEC 2007»
15 years 11 days ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
98
Voted
AMC
2005
138views more  AMC 2005»
15 years 11 days ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
COMPSEC
2004
95views more  COMPSEC 2004»
15 years 9 days ago
Cumulative notarization for long-term preservation of digital signatures
The long-term preservation of digitally signed documents may be approached and analyzed from various perspectives, i.e. future data readability, signature validity, storage media ...
Dimitrios Lekkas, Dimitris Gritzalis