Sciweavers

6164 search results - page 852 / 1233
» Teaching Computer Security
Sort
View
IADIS
2004
15 years 6 months ago
Voting with Designated Verifier Signature-Like Protocol
We propose in this paper a new voting scheme where the voter, while receiving a receipt for his/her vote allowing further contestations, cannot use it to reveal the vote to other u...
Emmanuel Dall'Olio, Olivier Markowitch
LISA
2001
15 years 6 months ago
TemplateTree II: The Post-Installation Setup Tool
After installing an OS distribution, a computer is generally not yet properly adapted to go into production at the local site. Security policies must be implemented, local service...
Tobias Oetiker
134
Voted
CHES
2010
Springer
133views Cryptology» more  CHES 2010»
15 years 6 months ago
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
This paper describes and analyzes the security of a general-purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these analyzes, we su...
Stéphane Badel, Nilay Dagtekin, Jorge Nakah...
AMC
2005
147views more  AMC 2005»
15 years 5 months ago
Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
Hwang and Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authorized proxy signers to sign messages on behalf of a group of original signers. ...
Yuh-Dauh Lyuu, Ming-Luen Wu
AMC
2005
188views more  AMC 2005»
15 years 5 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su