127
click to vote
ACISP
15 years 6 months ago
2001 Springer
In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4...
130
click to vote
ACISP
15 years 6 months ago
2001 Springer
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
133
click to vote
ACISP
15 years 6 months ago
2001 Springer
An English auction is the most familiar type of auctions. Generally, an electronic auction has mainly two entities, the registration manager(RM) who treats the registration of bidd...
112
click to vote
ACISP
15 years 6 months ago
2001 Springer
Abstract. At ACISP 2000, Yoo et al proposed a fast public key cryptosystem using matrices over a ring. The authors claim that the security of their system is based on the RSA probl...
103
click to vote
ACISP
15 years 6 months ago
2001 Springer
The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing ...
|