Sciweavers

415 search results - page 30 / 83
» A New RFID Privacy Model
Sort
View
ACISP
2007
Springer
14 years 20 days ago
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
Abstract. We propose new instantiations of chosen-ciphertext secure identitybased encryption schemes with wildcards (WIBE). Our schemes outperform all existing alternatives in term...
James Birkett, Alexander W. Dent, Gregory Neven, J...
ISCI
2008
86views more  ISCI 2008»
13 years 8 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
PET
2007
Springer
14 years 2 months ago
Two-Sided Statistical Disclosure Attack
We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries to uncover the receivers of messages sent through an anonymizing network support...
George Danezis, Claudia Díaz, Carmela Tronc...
IEEEARES
2006
IEEE
14 years 2 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
ACSAC
2003
IEEE
14 years 9 days ago
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol
When a receiver of a ciphertext message can not decrypt the message due to the fact that he has lost his private-key, the private-key of the receiver and session-key of the messag...
Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn