Sciweavers

12637 search results - page 238 / 2528
» Security for Extensible Systems
Sort
View
INTELLCOMM
2004
Springer
15 years 10 months ago
Secure Many-to-One Transmission of q-ary Symbols
There is a number of applications requiring a community of many senders to transmit some real-time information to a single receiver. Using unicast connections to send this traffic ...
Antoni Martínez-Ballesté, Francesc S...
154
Voted
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Provably Secure Partially Blind Signatures
Partially blind signature schemes are an extension of blind signature schemes that allow a signer to explicitly include necessary information (expiration date, collateral condition...
Masayuki Abe, Tatsuaki Okamoto
ACISP
2010
Springer
15 years 6 months ago
Security Estimates for Quadratic Field Based Cryptosystems
Abstract. We describe implementations for solving the discrete logarithm problem in the class group of an imaginary quadratic field and in the infrastructure of a real quadratic fi...
Jean-François Biasse, Michael J. Jacobson, ...
140
Voted
AISM
2004
15 years 6 months ago
Need to Know: Security or Liability?
The `Need to Know' concept is often quoted but rarely defined in the literature. In general the principle directs that unless an individual has a specific reason to have acce...
Christopher Bolan
170
Voted
POPL
1999
ACM
15 years 9 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett