Sciweavers

598 search results - page 68 / 120
» A fair certification protocol
Sort
View
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 1 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
USENIX
2008
14 years 7 days ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
COMCOM
2008
138views more  COMCOM 2008»
13 years 10 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CERA
2004
89views more  CERA 2004»
13 years 9 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
KIVS
2005
Springer
14 years 3 months ago
Revenue Maximisation in Peer-to-Peer Networks
: BitTorrent is a peer-to-peer (p2p) protocol for file-sharing. Its improvement over other file-sharing protocols is its tit-for-tat strategy to decide to whom a peer should uplo...
Kolja Eger, Ulrich Killat