Sciweavers

1166 search results - page 191 / 234
» Adaptively Secure Broadcast
Sort
View
CORR
2006
Springer
182views Education» more  CORR 2006»
13 years 11 months ago
Cryptanalysis of the CFVZ cryptosystem
The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the co...
Joan-Josep Climent, E. Gorla, J. Rosenthal
JCM
2008
74views more  JCM 2008»
13 years 11 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
13 years 11 months ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...
JCP
2007
159views more  JCP 2007»
13 years 11 months ago
Authoring of Units of Learning via Dialogue Systems
— Detailed and expressive e-learning specifications like IMS LD [1] are necessary to create efficient e-learning applications. E-learning specifications that meet these demand...
Dietmar Janetzko
PVLDB
2008
138views more  PVLDB 2008»
13 years 10 months ago
Authenticating the query results of text search engines
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time...
HweeHwa Pang, Kyriakos Mouratidis