Sciweavers

507 search results - page 38 / 102
» The XTR Public Key System
Sort
View
127
Voted
MOBISYS
2011
ACM
14 years 3 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
100
Voted
WETICE
2003
IEEE
15 years 6 months ago
Supporting Digital Signatures in Mobile Environments
Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when ...
Scott Campbell
113
Voted
ISOLA
2010
Springer
14 years 11 months ago
A Case Study in Model-Based Adaptation of Web Services
Abstract. Developing systems through the composition of reusable software services is not straightforward in most situations since different kinds of mismatch may occur among their...
Javier Cámara, José Antonio Mart&iac...
EUROCRYPT
2011
Springer
14 years 4 months ago
Homomorphic Signatures for Polynomial Functions
We construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Given the public key and a signed data set, there is an...
Dan Boneh, David Mandell Freeman
94
Voted
ACSAC
1999
IEEE
15 years 5 months ago
Generic Support for PKIX Certificate Management in CDSA
The Common Data Security Architecture (CDSA) from the Open Group is a flexible standard that defines APIs for security services needed for implementing Public Key Infrastructure (...
Shabnam Erfani, C. Sekar Chandersekaran