Sciweavers

83 search results - page 1 / 17
» ijnsec 2008
Sort
View
76
Voted
IJNSEC
2008
81views more  IJNSEC 2008»
15 years 2 months ago
Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability
Ali Bagherzandi, Javad Mohajeri, Mahmoud Salmasiza...
84
Voted
IJNSEC
2008
101views more  IJNSEC 2008»
15 years 2 months ago
A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability
Tarun Bhaskar, B. Narasimha Kamath, Soumyo D. Moit...
IJNSEC
2008
100views more  IJNSEC 2008»
15 years 2 months ago
Towards a Framework for Federated Global Identity Management
Mehrdad Naderi, Jawed I. A. Siddiqi, Babak Akhgar,...
114
Voted
IJNSEC
2008
140views more  IJNSEC 2008»
15 years 2 months ago
Distributed Paillier Plaintext Equivalence Test
Consider the following scenario with N + 2 parties, A, B, X1, X2,
Pei-Yih Ting, Xiao-Wei Huang
117
Voted
IJNSEC
2008
122views more  IJNSEC 2008»
15 years 1 months ago
A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting
Recently non-abelian groups have attracted the attention of cryptographers for constructing public-key cryptographic protocols. In this paper we use the conjugacy problem in non-a...
Tony Thomas, Arbind K. Lal