Sciweavers

787 search results - page 72 / 158
» Subversion-Resilient Signature Schemes
Sort
View
AINA
2004
IEEE
15 years 1 months ago
Generating Digital Signatures on Mobile Devices
With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Yu Lei, Deren Chen, Zhongding Jiang
IEEEIAS
2009
IEEE
14 years 7 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng
NDSS
2003
IEEE
15 years 3 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
ICPR
2000
IEEE
15 years 2 months ago
3D Objects Coding and Recognition Using Surface Signatures
This paper presents a new concept for 3D coding of freeform surfaces. The proposed coding technique uses the surface signature representation scheme [1]. This representation schem...
Sameh M. Yamany, Aly A. Farag
ECR
2006
81views more  ECR 2006»
14 years 9 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang