Sciweavers

83 search results - page 3 / 17
» ijnsec 2008
Sort
View
IJNSEC
2008
103views more  IJNSEC 2008»
13 years 6 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 6 months ago
Cryptanalysis of Syverson's Rational Exchange Protocol
The notion of rational exchange introduced by Syverson in 1998 is a particularly interesting alternative when an efficient scheme for fair exchange is required but the existence o...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 6 months ago
A Simple User Authentication Scheme for Grid Computing
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for us...
Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui L...
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 6 months ago
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme
In 2003, Hwang et al. proposed a new blind signature based on the RSA cryptosystem by employing Extended Euclidean algorithm. They claimed that the proposed scheme was untraceable...
Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang
IJNSEC
2008
81views more  IJNSEC 2008»
13 years 6 months ago
A Self-Concealing Mechanism for Authentication of Portable Communication Systems
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared...
Wei-Bin Lee, Chang-Kuo Yeh