Sciweavers

110 search results - page 12 / 22
» ijnsec 2006
Sort
View
IJNSEC
2006
67views more  IJNSEC 2006»
14 years 9 months ago
A Time-stamping Proxy Signature Scheme Using Time-stamping Service
In current proxy signature schemes, an original signer delegates her signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original si...
Eric Jui-Lin Lu, Cheng-Jian Huang
IJNSEC
2006
84views more  IJNSEC 2006»
14 years 9 months ago
Security on Generalized Feistel Scheme with SP Round Function
This paper studies the security against differential/linear cryptanalysis and the pseudorandomness for a class of generalized Feistel scheme with SP round function called GFSP. We ...
Wenling Wu, Wentao Zhang, Dongdai Lin
IJNSEC
2006
270views more  IJNSEC 2006»
14 years 9 months ago
Efficient Key Agreement for Large and Dynamic Multicast Groups
Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The ...
Liming Wang, Chuan-Kun Wu
IJNSEC
2006
107views more  IJNSEC 2006»
14 years 9 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
IJNSEC
2006
112views more  IJNSEC 2006»
14 years 9 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao