Sciweavers

1302 search results - page 20 / 261
» Soundness in the Public-Key Model
Sort
View
117
Voted
CGF
2004
98views more  CGF 2004»
15 years 1 months ago
Synthesizing Sound from Turbulent Field using Sound Textures for Interactive Fluid Simulation
Sound is an indispensable element for the simulation of a realistic virtual environment. Therefore, there has been much recent research focused on the simulation of realistic soun...
Yoshinori Dobashi, Tsuyoshi Yamamoto, Tomoyuki Nis...
IDTRUST
2009
ACM
15 years 8 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
ACISP
2005
Springer
15 years 7 months ago
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based
We present the first group signature scheme with provable security and signature size O(λ) bits where the group manager, the group members, and the Open Authority (OA) are all id...
Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
GRID
2006
Springer
15 years 1 months ago
Streamlining Grid Operations: Definition and Deployment of a Portal-based User Registration Service
Manual management of public key credentials can be a significant and often off-putting obstacle to Grid use, particularly for casual users. We describe the Portal-based User Regis...
Ian T. Foster, Veronika Nefedova, Mehran Ahsant, R...
SAINT
2003
IEEE
15 years 7 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta