Sciweavers

433 search results - page 20 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
14 years 2 months ago
The Futures of EU-Based eGovernment: A Scenario-Based Exploration
The future of eGovernment is very uncertain and requires to be approached by depicting different scenario in which a wide range of contextual factors, such as social, cultural, in...
Patrick van der Duin, Noor Huijboom
PADL
2001
Springer
13 years 12 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
CCS
2008
ACM
13 years 9 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
CSFW
2009
IEEE
14 years 2 months ago
Universally Composable Symmetric Encryption
For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities...
Ralf Küsters, Max Tuengerthal
POLICY
2007
Springer
14 years 1 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...