Sciweavers

ISN
1997
Springer
120views Communications» more  ISN 1997»
15 years 4 months ago
Implementing TMN-like Management Services in a TINA Compliant Architecture: A Case Study on Resource Configuration Management
TINA aims to provide an architecture to enable telecommunications networks to support the flex
David Griffin, George Pavlou, Thurain Tin
76
Voted
ISN
1997
Springer
15 years 4 months ago
VRML: Adding 3D to Network Management
Luca Deri, Dimitrios Manikis
79
Voted
ICICS
1997
Springer
15 years 4 months ago
Fault tolerant anonymous channel
Previous anonymous channels, called MIX nets, do not work if one center stops. This paper shows new anonymous channels which allow less than a half of faulty centers. A fault toler...
Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori...
66
Voted
ICICS
1997
Springer
15 years 4 months ago
Two efficient RSA multisignature schemes
Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho W...
ICICS
1997
Springer
15 years 4 months ago
An implementable scheme for secure delegation of computing and data
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, d...
Josep Domingo-Ferrer, Ricardo X. Sanchez del Casti...
97
Voted
ICICS
1997
Springer
15 years 4 months ago
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
Abstract. We present new related-key attacks on the block ciphers 3WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differential related-key attacks allow both keys and plaintex...
John Kelsey, Bruce Schneier, David Wagner
70
Voted
ICICS
1997
Springer
15 years 4 months ago
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
Mark Chapman, George I. Davida
94
Voted
ICICS
1997
Springer
15 years 4 months ago
Enforcing traceability in software
Traceability is a property of a communications protocol that ensures that the origin and/or destination of messages can be identified. The aims of this paper are twofold. Firstly t...
Colin Boyd
98
Voted
ICICS
1997
Springer
15 years 4 months ago
A new and optimal chosen-message attack on RSA-type cryptosystems
Abstract. Chosen-message attack on RSA is usually considered as an inherent property of its homomorphic structure. In this paper, we show that nonhomomorphic RSA-type cryptosystems...
Daniel Bleichenbacher, Marc Joye, Jean-Jacques Qui...
67
Voted
ICICS
1997
Springer
15 years 4 months ago
Minimizing the use of random oracles in authenticated encryption schemes
Mihir Bellare, Phillip Rogaway