Sciweavers

18 search results - page 4 / 4
» Using WebDAV for Improved Certificate Revocation and Publica...
Sort
View
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 7 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
WPES
2003
ACM
13 years 11 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
EWSPT
2003
Springer
13 years 11 months ago
Quality Ensuring Development of Software Processes
: Software development is a complex process where many organizational units, persons, systems and artifacts are involved. In companies that exceed a certain size the business proce...
Alexander Förster, Gregor Engels