Sciweavers

902 search results - page 85 / 181
» Security and Trust Requirements Engineering
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
We Need Assurance!
When will we be secure? Nobody knows for sure – but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customersā...
Brian D. Snow
ACISP
2009
Springer
15 years 4 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
EUROPKI
2004
Springer
15 years 3 months ago
How to Qualify Electronic Signatures and Time Stamps
Abstract. In this work we will show how non-qualified electronic signatures and time stamps can be efficiently enhanced in order to equip them with similar features as qualified ...
Detlef Hühnlein
CCS
2008
ACM
14 years 12 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
HERCMA
2001
141views Mathematics» more  HERCMA 2001»
14 years 11 months ago
Towards an ISO-9000 compliant certification service provider
In this paper we present a complete reference framework for the operation of Certification Service Provider as an organisation. The objective is to form an intermediate reference m...
Dimitrios Lekkas, Stefanos Gritzalis, Sokratis K. ...