Sciweavers

103 search results - page 7 / 21
» Asymmetric Concurrent Signatures
Sort
View
CRYPTO
2001
Springer
97views Cryptology» more  CRYPTO 2001»
13 years 11 months ago
Two-Party Generation of DSA Signatures
d Abstract) Philip MacKenzie and Michael K. Reiter Bell Labs, Lucent Technologies, Murray Hill, NJ, USA We describe a means of sharing the DSA signature function, so that two parti...
Philip D. MacKenzie, Michael K. Reiter
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
13 years 11 months ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
DATE
1998
IEEE
100views Hardware» more  DATE 1998»
13 years 11 months ago
Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs
After write operations, BIST schemes for RAMs relying on signature analysis must compress the entire memory contents to update the reference signature. This paper introduces a new...
Vyacheslav N. Yarmolik, Sybille Hellebrand, Hans-J...
CADE
2008
Springer
14 years 7 months ago
Celf - A Logical Framework for Deductive and Concurrent Systems (System Description)
CLF (Concurrent LF) [CPWW02a] is a logical framework for specifying and implementing deductive and concurrent systems from areas, such as programming language theory, security prot...
Anders Schack-Nielsen, Carsten Schürmann
CADE
2010
Springer
13 years 7 months ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...